https://github.com/pussycat0x/malicious-pdf
Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator
Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator
https://github.com/Evrytania/LTE-Cell-Scanner
https://harrisonsand.com/imsi-catcher/
https://github.com/Oros42/IMSI-catcher
https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector
https://github.com/ptrkrysik/gr-gsm/wiki/Passive-IMSI-Catcher
https://harrisonsand.com/imsi-catcher/
https://github.com/Oros42/IMSI-catcher
https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector
https://github.com/ptrkrysik/gr-gsm/wiki/Passive-IMSI-Catcher
GitHub
GitHub - Evrytania/LTE-Cell-Scanner: LTE SDR cell scanner optimized to work with very low performance RF front ends (8bit A/D,โฆ
LTE SDR cell scanner optimized to work with very low performance RF front ends (8bit A/D, 20dB noise figure) - Evrytania/LTE-Cell-Scanner
๐1
https://github.com/hahwul/dalfox
DalFox is an powerful open source XSS scanning tool and parameter analyzer and utility that fast the process of detecting and verify XSS flaws. It comes with a powerful testing engine, many niche features for the cool hacker!
DalFox is an powerful open source XSS scanning tool and parameter analyzer and utility that fast the process of detecting and verify XSS flaws. It comes with a powerful testing engine, many niche features for the cool hacker!
https://github.com/0xh4di/GSMDecryption
This open source software allows the 'cracking' of A5/1 keys used to encrypt GSM 2G calls and SMS. The cracking utility Kraken, developed by Frank A. Stevenson, is written in C++/python and runs on AMD GPUs or CPUs. Kraken leverages rainbow tables that were computed as a community effort.
This open source software allows the 'cracking' of A5/1 keys used to encrypt GSM 2G calls and SMS. The cracking utility Kraken, developed by Frank A. Stevenson, is written in C++/python and runs on AMD GPUs or CPUs. Kraken leverages rainbow tables that were computed as a community effort.
2FA Verification Code Bypass Attack via Burpsuite | OTP Verification Bypass | Bug Bounty
https://youtu.be/OjWhPenOkyA
https://youtu.be/OjWhPenOkyA
๐4
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ซ๐จ๐ญ๐จ๐๐จ๐ฅ ๐๐ข๐๐ค)
Interactive-Cyber-Security-Career-Roadmap.pdf
742.8 KB
[#CYBER_TRICKS_ZONE]
CREDITS :- CYBRARY.IT
SUPPORT TO CYBER TRICKS ZONE โค๏ธ
@cybertrickszone1
INTERACTIVE CYBER SECURITY CAREER ROADMAP CREDITS :- CYBRARY.IT
SUPPORT TO CYBER TRICKS ZONE โค๏ธ
@cybertrickszone1
https://github.com/aydinnyunus/Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs and Send to your Mail. Purpose of the project is testing the security of information systems
Get Keyboard,Mouse,ScreenShot,Microphone Inputs and Send to your Mail. Purpose of the project is testing the security of information systems
๐1
LFI Log Poisoning Attack (Reverse Shell, Privsec) | Bug Bounty
https://youtu.be/MDJZ7yeBARU
https://youtu.be/MDJZ7yeBARU
Forwarded from Bhartiya Hunters๐ฎ๐ณ (Founder & CEO โข)
Researchers uncover a set of 56 vulnerabilities affecting devices from 10 operational technology vendors (OT) โ widely used in industries such as oil and gas, chemical, nuclear, power generation and distribution and building automation.
Read: https://thehackernews.com/2022/06/researchers-disclose-56-vulnerabilities.html Shared by Indian hunters
Read: https://thehackernews.com/2022/06/researchers-disclose-56-vulnerabilities.html Shared by Indian hunters
๐6
Forwarded from Bhartiya Hunters๐ฎ๐ณ (Founder & CEO โข)
๐3
Forwarded from ๐๐ซ๐จ๐ญ๐จ๐๐จ๐ฅ ๐๐ข๐๐ค
YouTube
How to Watch YouTube Videos Completely Ads free? | 2 amazing Android apps | vanced alternative 2022
in this video i m going to show you how to watch ads free YouTube video in android apps , watch the video till the end
if you have any doubt queries then comment below.
Newpipe Apk download Link :- https://newpipe.net/#download
YouTube Revanced Downloadโฆ
if you have any doubt queries then comment below.
Newpipe Apk download Link :- https://newpipe.net/#download
YouTube Revanced Downloadโฆ
Forwarded from Bhartiya Hunters๐ฎ๐ณ (Founder & CEO โข)
Finding client-side prototype pollution with DOM Invader - Valueable Blog - Help in Cross Site Scripting in a Very Effective way!
https://portswigger.net/blog/finding-client-side-prototype-pollution-with-dom-invader
Shared by @Indianshunters
https://portswigger.net/blog/finding-client-side-prototype-pollution-with-dom-invader
Shared by @Indianshunters
PortSwigger Blog
Finding client-side prototype pollution with DOM Invader
Last year we made it significantly easier to find DOM XSS, when we introduced a brand new tool called DOM Invader. This year, we've improved DOM Invader to make finding CSPP (client-side prototype pol
๐3
Forwarded from Bhartiya Hunters๐ฎ๐ณ (Founder & CEO โข)
RIG Exploit Kit replaces the Raccoon stealer trojan with Dridex financial malware after one of its developers was killed in the Russian-Ukrainian war.
Read details: https://thehackernews.com/2022/06/rig-exploit-kit-now-infects-victims-pcs.html
Shared by @Indianshunters
Read details: https://thehackernews.com/2022/06/rig-exploit-kit-now-infects-victims-pcs.html
Shared by @Indianshunters
๐2
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ซ๐จ๐ญ๐จ๐๐จ๐ฅ ๐๐ข๐๐ค)
[#CYBER_TRICKS_ZONE]
Best Top 18 Website to test Your Ethical Hacking Skills!
Link :- https://www.hackersblog.tech/2022/06/best-top-18-website-to-test-your.html
Credits:- @protocolnick
SUPPORT TO CYBER TRICKS ZONE โค๏ธ
@cybertrickszone1
Best Top 18 Website to test Your Ethical Hacking Skills!
Link :- https://www.hackersblog.tech/2022/06/best-top-18-website-to-test-your.html
Credits:- @protocolnick
SUPPORT TO CYBER TRICKS ZONE โค๏ธ
@cybertrickszone1
Admin Authentication Bypass Lead to Admin Account Takeover | UPS[.]com
https://youtu.be/H0TkDabDxWc
https://youtu.be/H0TkDabDxWc
๐2