Bypassing EDRs With EDR-Preloading
❤️
https://malwaretech.com/2024/02/bypassing-edrs-with-edr-preload.html
❤️
https://malwaretech.com/2024/02/bypassing-edrs-with-edr-preload.html
❤5
BounceBack - Stealth Redirector For Your Red Team Operation Security
https://github.com/D00Movenok/BounceBack
https://github.com/D00Movenok/BounceBack
❤2🔥2
This media is not supported in your browser
VIEW IN TELEGRAM
1-Liner to find LFI (Local File Inclusion) Vulnerabilities.🔥
This one-liner will allow you to find LFI vulnerabilities on multiple URLs. Utilizing 'paramspider' to collect URL parameters from web archives, importing them to 'ffuf' for fuzzing while using an external wordlist dictionary.
📢 The following tools are required:
🔻https://github.com/ffuf/ffuf
🔻https://github.com/devanshbatham/ParamSpider
#bugbounty
This one-liner will allow you to find LFI vulnerabilities on multiple URLs. Utilizing 'paramspider' to collect URL parameters from web archives, importing them to 'ffuf' for fuzzing while using an external wordlist dictionary.
📢 The following tools are required:
🔻https://github.com/ffuf/ffuf
🔻https://github.com/devanshbatham/ParamSpider
#bugbounty
❤4🔥4👍1
Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of the box
https://github.com/SpiralBL0CK/Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20e
https://github.com/SpiralBL0CK/Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20e
GitHub
GitHub - SpiralBL0CK/Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20e: Remote…
Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of the box - SpiralBL0CK/Remote-buffer-overflow-over-wifi_stack...
❤4
PoC Exploit for Windows NTLM Privilege Escalation Flaw (CVE-2023-21746) Published
https://securityonline.info/poc-exploit-for-windows-ntlm-privilege-escalation-flaw-cve-2023-21746-published/
https://securityonline.info/poc-exploit-for-windows-ntlm-privilege-escalation-flaw-cve-2023-21746-published/
❤2🔥1
📢 أهلا جميعا ...
لا تنسى أيضا الانضمام الى قناتنا الثانية لنشر الادوات المخصصة لاختبار الاختراق مجانا 🔥
سيتم النشر فيها يوميا اشياء جميلة
🔻رابط المجموعة : https://t.me/Cyberwise_tools
لا تنسى أيضا الانضمام الى قناتنا الثانية لنشر الادوات المخصصة لاختبار الاختراق مجانا 🔥
سيتم النشر فيها يوميا اشياء جميلة
🔻رابط المجموعة : https://t.me/Cyberwise_tools
Telegram
Cyberwise Tools
برامج / سكريبتات / أدوات تساعد في اختبار الاختراق
الصفحة الرئيسية : https://t.me/Cyber_wise
الصفحة الرئيسية : https://t.me/Cyber_wise
❤5
Trusted Domain, Hidden Danger: Deceptive URL Redirections in Email Phishing Attacks🔥
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/trusted-domain-hidden-danger-deceptive-url-redirections-in-email-phishing-attacks/
#Pentesting #CyberSecurity
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/trusted-domain-hidden-danger-deceptive-url-redirections-in-email-phishing-attacks/
#Pentesting #CyberSecurity
Python Info-stealer Distributed by Malicious Excel Document 💀
https://www.fortinet.com/blog/threat-research/python-info-stealer-malicious-excel-document
#Pentesting #Python #CyberSecurity
https://www.fortinet.com/blog/threat-research/python-info-stealer-malicious-excel-document
#Pentesting #Python #CyberSecurity
❤3
Extract Passwords & Other User Credentials with LaZagne 😱
https://medium.com/@frost1/extract-passwords-other-user-credentials-with-lazagne-609c6e7cbaff
#Pentesting
https://medium.com/@frost1/extract-passwords-other-user-credentials-with-lazagne-609c6e7cbaff
#Pentesting
❤3
This media is not supported in your browser
VIEW IN TELEGRAM
قاعدين تأخدوا شوية معلومات من التدوينات التي اشاركها ولا أخليني مع الفيديوهات 😂 ؟
🤣13❤7
Spinning Webs — Unveiling Arachne for Web Shell C2 🔥
https://posts.specterops.io/spinning-webs-unveiling-arachne-for-web-shell-c2-26c40f570ea1
#Pentesting
https://posts.specterops.io/spinning-webs-unveiling-arachne-for-web-shell-c2-26c40f570ea1
#Pentesting
🔥4❤2
HijackLoader Expands Techniques to Improve Defense Evasion
https://www.crowdstrike.com/blog/hijackloader-expands-techniques/
#Pentesting
https://www.crowdstrike.com/blog/hijackloader-expands-techniques/
#Pentesting
🔥2
SOAPHound — tool to collect Active Directory data via ADWS
https://medium.com/falconforce/soaphound-tool-to-collect-active-directory-data-via-adws-165aca78288c
#pentesting #SOAPHound
https://medium.com/falconforce/soaphound-tool-to-collect-active-directory-data-via-adws-165aca78288c
#pentesting #SOAPHound
👍3