Forwarded from 卩ro 爪Cracker
NjRat 0.7D Danger Edition.zip
15.9 MB
Forwarded from 卩ro 爪Cracker
Forwarded from 卩ro 爪Cracker
SMBMap
SMBMap allows users to enumerate samba share drives across an entire domain. List share drives, drive permissions, share contents, upload/download functionality, file name auto-download pattern matching, and even execute remote commands. This tool was designed with pen testing in mind, and is intended to simplify searching for potentially sensitive data across large networks.
Some of the features have not been thoroughly tested, so changes will be forth coming as bugs are found. I only really find and fix the bugs while I'm on engagements, so progress is a bit slow. Any feedback or bug reports would be appreciated. It's definitely rough around the edges, but I'm just trying to pack in features at the moment. Version 2.0 should clean up the code a lot….whenever that actually happens ;). Thanks for checking it out!!
There's a known oddity in the SMBServer component used for the file content search feature. For some reason it throws an exception in the threading library. It still works, but the error is annoying none the less.
Features:
▫️ Pass-the-Hash Support
▫️ File upload/download/delete
▫️ Permission enumeration (writable share, meet Metasploit)
▫️ Remote Command Execution
▫️ Distrubted file content searching (beta!)
▫️ File name matching (with an auto downoad capability)
https://github.com/tothi/smbmap
#ad #samba
SMBMap allows users to enumerate samba share drives across an entire domain. List share drives, drive permissions, share contents, upload/download functionality, file name auto-download pattern matching, and even execute remote commands. This tool was designed with pen testing in mind, and is intended to simplify searching for potentially sensitive data across large networks.
Some of the features have not been thoroughly tested, so changes will be forth coming as bugs are found. I only really find and fix the bugs while I'm on engagements, so progress is a bit slow. Any feedback or bug reports would be appreciated. It's definitely rough around the edges, but I'm just trying to pack in features at the moment. Version 2.0 should clean up the code a lot….whenever that actually happens ;). Thanks for checking it out!!
There's a known oddity in the SMBServer component used for the file content search feature. For some reason it throws an exception in the threading library. It still works, but the error is annoying none the less.
Features:
▫️ Pass-the-Hash Support
▫️ File upload/download/delete
▫️ Permission enumeration (writable share, meet Metasploit)
▫️ Remote Command Execution
▫️ Distrubted file content searching (beta!)
▫️ File name matching (with an auto downoad capability)
https://github.com/tothi/smbmap
#ad #samba
Forwarded from 卩ro 爪Cracker
COM-Hunter
COM Hijacking VOODOO
COM-hunter is a COM Hijacking persistnce tool written in C#.
Features:
▫️ Finds out entry valid CLSIDs in the victim's machine.
▫️ Finds out valid CLSIDs via Task Scheduler in the victim's machine.
▫️ Finds out if someone already used any of those valid CLSIDs in order to do COM persistence (LocalServer32/InprocServer32).
▫️ Finds out if someone already used any of valid CLSID via Task Scheduler in order to do COM persistence (LocalServer32/InprocServer32).
▫️ Tries to do automatically COM Hijacking Persistence with general valid CLSIDs (LocalServer32/InprocServer32).
▫️ Tries to do automatically COM Hijacking Persistence via Task Scheduler.
▫️ Tries to use "TreatAs" key in order to refere to a different component.
https://github.com/nickvourd/COM-Hunter
COM Hijacking VOODOO
COM-hunter is a COM Hijacking persistnce tool written in C#.
Features:
▫️ Finds out entry valid CLSIDs in the victim's machine.
▫️ Finds out valid CLSIDs via Task Scheduler in the victim's machine.
▫️ Finds out if someone already used any of those valid CLSIDs in order to do COM persistence (LocalServer32/InprocServer32).
▫️ Finds out if someone already used any of valid CLSID via Task Scheduler in order to do COM persistence (LocalServer32/InprocServer32).
▫️ Tries to do automatically COM Hijacking Persistence with general valid CLSIDs (LocalServer32/InprocServer32).
▫️ Tries to do automatically COM Hijacking Persistence via Task Scheduler.
▫️ Tries to use "TreatAs" key in order to refere to a different component.
https://github.com/nickvourd/COM-Hunter
tplink.py
11.6 KB
CVE-2022-30075
Authenticated Remote Code Execution in Tp-Link Routers
Authenticated Remote Code Execution in Tp-Link Routers
2FA Verification Code Bypass Attack via Burpsuite | OTP Verification Bypass | Bug Bounty
https://youtu.be/DUm23Pfgz6k
https://youtu.be/DUm23Pfgz6k
Storm-Breaker a social engineering tool that can be used to access the location, webcam, and microphone.
https://github.com/ultrasecurity/Storm-Breaker
https://github.com/ultrasecurity/Storm-Breaker
https://github.com/impact-i/reFlutter
This framework helps with Flutter apps reverse engineering using the patched version of the Flutter library which is already compiled and ready for app repacking. This library has snapshot deserialization process modified to allow you perform dynamic analysis in a convenient way.
This framework helps with Flutter apps reverse engineering using the patched version of the Flutter library which is already compiled and ready for app repacking. This library has snapshot deserialization process modified to allow you perform dynamic analysis in a convenient way.
https://github.com/zidansec/CloudPeler
CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool you can easily see the real IP of websites that have been protected by CloudFlare. The resulting information is certainly very useful for conducting further penetration testing, and analyzing websites with the same server.
CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool you can easily see the real IP of websites that have been protected by CloudFlare. The resulting information is certainly very useful for conducting further penetration testing, and analyzing websites with the same server.
👍2
https://github.com/necreas1ng/VLANPWN
VLANPWN
VLAN attacks toolkit
DoubleTagging.py - This tool is designed to carry out a VLAN Hopping attack. As a result of injection of a frame with two 802.1Q tags, a test ICMP request will also be sent.
DTPHijacking.py - A script for conducting a DTP Switch Spoofing/Hijacking attack. Sends a malicious DTP-Desirable frame, as a result of which the attacker's machine becomes a trunk channel. The impact of this attack is that you can bypass the segmentation of VLAN networks and see all the traffic of VLAN networks.
VLANPWN
VLAN attacks toolkit
DoubleTagging.py - This tool is designed to carry out a VLAN Hopping attack. As a result of injection of a frame with two 802.1Q tags, a test ICMP request will also be sent.
DTPHijacking.py - A script for conducting a DTP Switch Spoofing/Hijacking attack. Sends a malicious DTP-Desirable frame, as a result of which the attacker's machine becomes a trunk channel. The impact of this attack is that you can bypass the segmentation of VLAN networks and see all the traffic of VLAN networks.
👍2🔥1
Forwarded from 卩ro 爪Cracker
Forwarded from 卩ro 爪Cracker
Sberbank Translations.zip
1.5 GB
More than 13,500 files hacked from the Sberbank of Russia translation agency provide a unique insight into the interests of the bank and its clients. Translations include political analysis, military sales and open source reporting.
Forwarded from 卩ro 爪Cracker
How to open a safe
A vulnerability allows opening electronic safes from the Sentry Safe and Master Lock company without any pin code.
https://github.com/H4ckd4ddy/bypass-sentry-safe
A vulnerability allows opening electronic safes from the Sentry Safe and Master Lock company without any pin code.
https://github.com/H4ckd4ddy/bypass-sentry-safe
👍1
Forwarded from 卩ro 爪Cracker
Dropbox_9.8m_mail_pass.txt
296.4 MB
Forwarded from 卩ro 爪Cracker
raptor_waf
Raptor is a Web application firewall made in C that uses DFA to block SQL injection, Cross-site scripting, and path traversal.
https://github.com/CoolerVoid/raptor_waf
Research:
http://funguscodes.blogspot.com.br/
Raptor is a Web application firewall made in C that uses DFA to block SQL injection, Cross-site scripting, and path traversal.
https://github.com/CoolerVoid/raptor_waf
Research:
http://funguscodes.blogspot.com.br/
👍2
Forwarded from 卩ro 爪Cracker
HopLa
All the power of PayloadsAllTheThings, without the overhead. This extension adds autocompletion support and useful payloads in #Burp Suite to make your intrusion easier.
Feel free to improve with your payloads ! ❤️
https://github.com/synacktiv/HopLa
All the power of PayloadsAllTheThings, without the overhead. This extension adds autocompletion support and useful payloads in #Burp Suite to make your intrusion easier.
Feel free to improve with your payloads ! ❤️
https://github.com/synacktiv/HopLa
👍2