Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of the box
https://github.com/SpiralBL0CK/Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20e
https://github.com/SpiralBL0CK/Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20e
GitHub
GitHub - SpiralBL0CK/Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20e: Remote…
Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of the box - SpiralBL0CK/Remote-buffer-overflow-over-wifi_stack...
❤4
PoC Exploit for Windows NTLM Privilege Escalation Flaw (CVE-2023-21746) Published
https://securityonline.info/poc-exploit-for-windows-ntlm-privilege-escalation-flaw-cve-2023-21746-published/
https://securityonline.info/poc-exploit-for-windows-ntlm-privilege-escalation-flaw-cve-2023-21746-published/
❤2🔥1
📢 أهلا جميعا ...
لا تنسى أيضا الانضمام الى قناتنا الثانية لنشر الادوات المخصصة لاختبار الاختراق مجانا 🔥
سيتم النشر فيها يوميا اشياء جميلة
🔻رابط المجموعة : https://t.me/Cyberwise_tools
لا تنسى أيضا الانضمام الى قناتنا الثانية لنشر الادوات المخصصة لاختبار الاختراق مجانا 🔥
سيتم النشر فيها يوميا اشياء جميلة
🔻رابط المجموعة : https://t.me/Cyberwise_tools
Telegram
Cyberwise Tools
برامج / سكريبتات / أدوات تساعد في اختبار الاختراق
الصفحة الرئيسية : https://t.me/Cyber_wise
الصفحة الرئيسية : https://t.me/Cyber_wise
❤5
Trusted Domain, Hidden Danger: Deceptive URL Redirections in Email Phishing Attacks🔥
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/trusted-domain-hidden-danger-deceptive-url-redirections-in-email-phishing-attacks/
#Pentesting #CyberSecurity
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/trusted-domain-hidden-danger-deceptive-url-redirections-in-email-phishing-attacks/
#Pentesting #CyberSecurity
Python Info-stealer Distributed by Malicious Excel Document 💀
https://www.fortinet.com/blog/threat-research/python-info-stealer-malicious-excel-document
#Pentesting #Python #CyberSecurity
https://www.fortinet.com/blog/threat-research/python-info-stealer-malicious-excel-document
#Pentesting #Python #CyberSecurity
❤3
Extract Passwords & Other User Credentials with LaZagne 😱
https://medium.com/@frost1/extract-passwords-other-user-credentials-with-lazagne-609c6e7cbaff
#Pentesting
https://medium.com/@frost1/extract-passwords-other-user-credentials-with-lazagne-609c6e7cbaff
#Pentesting
❤3
This media is not supported in your browser
VIEW IN TELEGRAM
قاعدين تأخدوا شوية معلومات من التدوينات التي اشاركها ولا أخليني مع الفيديوهات 😂 ؟
🤣13❤7
Spinning Webs — Unveiling Arachne for Web Shell C2 🔥
https://posts.specterops.io/spinning-webs-unveiling-arachne-for-web-shell-c2-26c40f570ea1
#Pentesting
https://posts.specterops.io/spinning-webs-unveiling-arachne-for-web-shell-c2-26c40f570ea1
#Pentesting
🔥4❤2
HijackLoader Expands Techniques to Improve Defense Evasion
https://www.crowdstrike.com/blog/hijackloader-expands-techniques/
#Pentesting
https://www.crowdstrike.com/blog/hijackloader-expands-techniques/
#Pentesting
🔥2
SOAPHound — tool to collect Active Directory data via ADWS
https://medium.com/falconforce/soaphound-tool-to-collect-active-directory-data-via-adws-165aca78288c
#pentesting #SOAPHound
https://medium.com/falconforce/soaphound-tool-to-collect-active-directory-data-via-adws-165aca78288c
#pentesting #SOAPHound
👍3
Another shellcode injection technique using C++ that attempts to bypass Windows Defender using XOR encryption sorcery and UUID strings madness :)
https://github.com/Bl4ckM1rror/FUD-UUID-Shellcode
https://github.com/Bl4ckM1rror/FUD-UUID-Shellcode
❤3
ADCS Attack Paths in BloodHound 👀
https://specterops.io/blog/2024/01/24/adcs-attack-paths-in-bloodhound-part-1/
https://specterops.io/blog/2024/01/24/adcs-attack-paths-in-bloodhound-part-1/
❤2