CVE-2020-0022 an Android 8.0-9.0 Bluetooth Zero-Click RCE – BlueFrag https://t.co/8ZpBmGaeei pic.twitter.com/6QrIHSDZ2y
— DragonJAR (@DragonJAR) April 25, 2020
— DragonJAR (@DragonJAR) April 25, 2020
Insinuator.net
CVE-2020-0022 an Android 8.0-9.0 Bluetooth Zero-Click RCE – BlueFrag
Nowadays, Bluetooth is an integral part of mobile devices. Smartphones interconnect with smartwatches and wireless headphones. By default, most devices are configured to accept Bluetooth connections from any
nearby unauthenticated device. Bluetooth packets…
nearby unauthenticated device. Bluetooth packets…
¡Aprende ciberseguridad jugando!: porque la ciberseguridad no tiene que ser aburrida" https://www.incibe.es/protege-tu-empresa/blog/aprende-ciberseguridad-jugando-porque-ciberseguridad-no-tiene-ser-aburrida
INCIBE
¡Aprende ciberseguridad jugando!: porque la ciberseguridad no tiene
Cada 1 de abril se celebra el Día Internacional de la Diversión en el Trabajo. Desde Protege tu empresa te ofrecemos varias posibilidades para formarte en ciberseguridad de una manera amena y
💥 Duplicate Page and Post < 2.5.7 & WP Post Page Clone - SQL Injections due to Duplicated Snippets
✅ 2.5.7
🔗 https://wordpress.org/plugins/duplicate-wp-page-post/
ℹ️ https://blog.sucuri.net/2020/04/duplicated-vulnerabilities-in-wordpress-plugins.html
✅ 2.5.7
🔗 https://wordpress.org/plugins/duplicate-wp-page-post/
ℹ️ https://blog.sucuri.net/2020/04/duplicated-vulnerabilities-in-wordpress-plugins.html
WordPress.org
Duplicate Page and Post
Duplicate post, Duplicate page and Duplicate custom post or clone page and clone post.
DeathRansom: un ransomware escrito en Python con técnicas de evasión
https://www.hackplayers.com/2020/04/deathransom-un-ransomware-en-python.html
https://www.hackplayers.com/2020/04/deathransom-un-ransomware-en-python.html
Hackplayers
DeathRansom: un ransomware escrito en Python con técnicas de evasión
DeathRansom del brasileño ReddyyZ es un ransomware desarrollado en python con fines educativos que implementa algunas sencillas pero int...
Curso de bash scripting y automatización de procesos
https://mega.nz/#F!FfxDBCYB!hPKrWPyDUGUoc7wXJEBQnA
Python Desde 0 Hasta Hacking - MÁSTER En Hacking con Python
https://mega.nz/#F!PO5FyKTa!bCNl3Y87Dau-quHbGSRddw
https://mega.nz/#F!FfxDBCYB!hPKrWPyDUGUoc7wXJEBQnA
Python Desde 0 Hasta Hacking - MÁSTER En Hacking con Python
https://mega.nz/#F!PO5FyKTa!bCNl3Y87Dau-quHbGSRddw
mega.nz
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now
Unos consejos para hackers, diez libros y tres cursos
http://feedproxy.google.com/~r/ElLadoDelMal/~3/Se0B7wndMEs/unos-consejos-para-hackers-diez-libros.html
http://feedproxy.google.com/~r/ElLadoDelMal/~3/Se0B7wndMEs/unos-consejos-para-hackers-diez-libros.html
Elladodelmal
Unos consejos para hackers, diez libros y tres cursos
Blog personal de Chema Alonso, consultor de seguridad en Informática 64, sobre seguridad, hacking, hackers, Cálico Electrónico y sus paranoias.
El ransomware LockBit toma ejemplo de REvil y Maze para mantenerse actualizado
https://unaaldia.hispasec.com/2020/04/el-ransomware-lockbit-toma-ejemplo-de-revil-y-maze-para-mantenerse-actualizado.html
https://unaaldia.hispasec.com/2020/04/el-ransomware-lockbit-toma-ejemplo-de-revil-y-maze-para-mantenerse-actualizado.html
Una al Día
El ransomware LockBit toma ejemplo de REvil y Maze para mantenerse actualizado - Una al Día
Recientemente se ha descubierto que el ransomware Lockibit está incorporando nuevas funcionalidades. Siguiendo el ejemplo de REvil y Maze, Lockbit está amenazando a sus víctimas con la publicación de los datos en el caso de que no se llegue a efectuar el…
Hacking Windows: BITSAdmin for Pentesters
http://feedproxy.google.com/~r/ElLadoDelMal/~3/8uDNsmuss40/hacking-windows-bitsadmin-for-pentesters.html
http://feedproxy.google.com/~r/ElLadoDelMal/~3/8uDNsmuss40/hacking-windows-bitsadmin-for-pentesters.html
Elladodelmal
Hacking Windows: BITSAdmin for Pentesters
Blog personal de Chema Alonso, consultor de seguridad en Informática 64, sobre seguridad, hacking, hackers, Cálico Electrónico y sus paranoias.
¿Cómo se realiza un Pentest? Un Penetration Testing o Test de Penetración, es un procedimiento metodológico y sistemático en el que se simula un ataque real a una red o sistema, con el fin de descubrir y reparar sus problemas de seguridad, https://t.co/cIo2NBbap1 pic.twitter.com/DoXHj1vSnf
— DragonJAR (@DragonJAR) April 28, 2020
— DragonJAR (@DragonJAR) April 28, 2020
HACKING ANDROID COURSES
1) Penetration Testing
> watch
https://mega.nz/folder/CY0zUACT#OVODsvO2PkC5Biv43i__NQ
2) Setup Your Lab
> https://mega.nz/folder/TM1jyABL#40eUd_dpLEchdUAxbXPEiQ
3) Finding Your way around Kali
> https://mega.nz/folder/fVl3hI7J#tKsrQ4rjzd97b7sah6gwYw
4) IMPORTANT TOOL
> https://mega.nz/folder/fB9T0CAD#6jdad6-5XW-fSFhuhYO7Uw
5) Exploitations
> https://mega.nz/folder/fElDXIwA#y6qSr6jMk5dTkXUaDeEe_w
6) Hacking Android Devices :
> https://mega.nz/folder/HJ8BwQrI#JiQhByO7NvsuU_nRslRhZw
7) Social Engeneering
> https://mega.nz/folder/vUshmAgD#lJpAwyKwLss9ogVZzrnFvw
8) Hacking Using Android Devices
> https://mega.nz/folder/aVsFzQ4S#MYrQ9rc3pjDjq2pjVHCtoA
1) Penetration Testing
> watch
https://mega.nz/folder/CY0zUACT#OVODsvO2PkC5Biv43i__NQ
2) Setup Your Lab
> https://mega.nz/folder/TM1jyABL#40eUd_dpLEchdUAxbXPEiQ
3) Finding Your way around Kali
> https://mega.nz/folder/fVl3hI7J#tKsrQ4rjzd97b7sah6gwYw
4) IMPORTANT TOOL
> https://mega.nz/folder/fB9T0CAD#6jdad6-5XW-fSFhuhYO7Uw
5) Exploitations
> https://mega.nz/folder/fElDXIwA#y6qSr6jMk5dTkXUaDeEe_w
6) Hacking Android Devices :
> https://mega.nz/folder/HJ8BwQrI#JiQhByO7NvsuU_nRslRhZw
7) Social Engeneering
> https://mega.nz/folder/vUshmAgD#lJpAwyKwLss9ogVZzrnFvw
8) Hacking Using Android Devices
> https://mega.nz/folder/aVsFzQ4S#MYrQ9rc3pjDjq2pjVHCtoA
mega.nz
File folder on MEGA
Para unirte a la videollamada, haz clic en este enlace: https://meet.google.com/htd-peyv-oah
Si quieres unirte por teléfono, llama al +1 484-681-2220 e introduce este PIN: 270 741 242#
Si quieres unirte por teléfono, llama al +1 484-681-2220 e introduce este PIN: 270 741 242#
Google
Real-time meetings by Google. Using your browser, share your video, desktop, and presentations with teammates and customers.
Herramienta para enumeración avanzada para SSL de OWASP.
http://feedproxy.google.com/~r/GuruDeLaInformtica/~3/HdkfWbE80mU/herramienta-para-enumeracion-avanzada-para-ssl-de-owasp
http://feedproxy.google.com/~r/GuruDeLaInformtica/~3/HdkfWbE80mU/herramienta-para-enumeracion-avanzada-para-ssl-de-owasp
GURÚ DE LA INFORMÁTICA
Herramienta para enumeración avanzada para SSL de OWASP - GURÚ DE LA INFORMÁTICA
Termux-Linux Tools
android-apktool 1.5.2 A tool for reengineering Android apk files. http://forum.xda-developers.com/showthread.php?t=1755243
android-ndk r9c Android C/C++ developer kit. http://developer.android.com/sdk/ndk/index.html
android-sdk-platform-tools r19 Platform-Tools for Google Android SDK (adb and fastboot) http://developer.android.com/sdk/index.html
android-sdk r22.3 Google Android SDK http://developer.android.com/sdk/index.html
android-udev-rules 8340.db8ef4a Android udev rules. https://github.com/bbqlinux/android-udev-rules
androidsniffer 0.1 A perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more. http://packetstormsecurity.com/files/97464/Andr01d-Magic-Dumper.1.html
anontwi 1.0 A free software python client designed to navigate anonymously on social networks. It supports Identi.ca and Twitter.com. http://anontwi.sourceforge.net/
aphopper 0.3 AP Hopper is a program that automatically hops between access points of different wireless networks. http://aphopper.sourceforge.net/
apnbf 0.1 A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device. http://www.c0decafe.de/
arachni 1.0.6 A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications. https://www.arachni-scanner.com
arduino 1.0.5 Arduino SDK (includes patched avrdude and librxtx) http://arduino.cc/en/Main/Software
argus 3.0.8 Network monitoring tool with flow control. http://qosient.com/argus/
argus-clients 3.0.8 Network monitoring client for Argus. http://qosient.com/argus/
armitage 141120 A graphical cyber attack management tool for Metasploit. http://www.fastandeasyhacking.com/
arp-scan 1.9 A tool that uses ARP to discover and fingerprint IP hosts on the local network http://www.nta-monitor.com/tools/arp-scan/
arpalert 2.0.12 Monitor ARP changes in ethernet networks http://www.arpalert.org/
arpantispoofer 1.0.1.32 A utility to detect and resist BIDIRECTIONAL ARP spoofing. It can anti-spoof for not only the local host, but also other hosts in the same subnet. It is also a handy helper for gateways which don't work well with ARP. http://arpantispoofer.sourceforge.net/
arpoison 0.6 The UNIX arp cache update utility http://www.arpoison.net
arpon 2.7 A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks. http://arpon.sourceforge.net/
arpwner 26.f300fdf GUI-based python tool for arp posioning and dns poisoning attacks. https://github.com/ntrippar/ARPwner
artillery 1.0.2 A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system https://www.trustedsec.com/downloads/artillery/
asleap 2.2 Actively recover LEAP/PPTP passwords. http://www.willhackforsushi.com/Asleap.html
asp-audit 2BETA An ASP fingerprinting tool and vulnerability scanner. http://seclists.org/basics/2006/Sep/128
athena-ssl-scanner 0.5.2 a SSL cipher scanner that checks all cipher codes. It can identify about 150 different ciphers. http://packetstormsecurity.com/files/93062/Athena-SSL-Cipher-Scanner.html
atstaketools 0.1 This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics. http://packetstormsecurity.com/files/50718/AtStakeTools.zip.html
autopsy 2.24 A GUI for The Sleuth Kit. http://www.sleuthkit.org/autopsy
azazel 10.401e3aa A userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. https://github.com/chokepoint/azazel
backcookie 44.cbf5b8b Small backdoor using cookie. https://github.com/mrjopino/backcookie
android-apktool 1.5.2 A tool for reengineering Android apk files. http://forum.xda-developers.com/showthread.php?t=1755243
android-ndk r9c Android C/C++ developer kit. http://developer.android.com/sdk/ndk/index.html
android-sdk-platform-tools r19 Platform-Tools for Google Android SDK (adb and fastboot) http://developer.android.com/sdk/index.html
android-sdk r22.3 Google Android SDK http://developer.android.com/sdk/index.html
android-udev-rules 8340.db8ef4a Android udev rules. https://github.com/bbqlinux/android-udev-rules
androidsniffer 0.1 A perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more. http://packetstormsecurity.com/files/97464/Andr01d-Magic-Dumper.1.html
anontwi 1.0 A free software python client designed to navigate anonymously on social networks. It supports Identi.ca and Twitter.com. http://anontwi.sourceforge.net/
aphopper 0.3 AP Hopper is a program that automatically hops between access points of different wireless networks. http://aphopper.sourceforge.net/
apnbf 0.1 A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device. http://www.c0decafe.de/
arachni 1.0.6 A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications. https://www.arachni-scanner.com
arduino 1.0.5 Arduino SDK (includes patched avrdude and librxtx) http://arduino.cc/en/Main/Software
argus 3.0.8 Network monitoring tool with flow control. http://qosient.com/argus/
argus-clients 3.0.8 Network monitoring client for Argus. http://qosient.com/argus/
armitage 141120 A graphical cyber attack management tool for Metasploit. http://www.fastandeasyhacking.com/
arp-scan 1.9 A tool that uses ARP to discover and fingerprint IP hosts on the local network http://www.nta-monitor.com/tools/arp-scan/
arpalert 2.0.12 Monitor ARP changes in ethernet networks http://www.arpalert.org/
arpantispoofer 1.0.1.32 A utility to detect and resist BIDIRECTIONAL ARP spoofing. It can anti-spoof for not only the local host, but also other hosts in the same subnet. It is also a handy helper for gateways which don't work well with ARP. http://arpantispoofer.sourceforge.net/
arpoison 0.6 The UNIX arp cache update utility http://www.arpoison.net
arpon 2.7 A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks. http://arpon.sourceforge.net/
arpwner 26.f300fdf GUI-based python tool for arp posioning and dns poisoning attacks. https://github.com/ntrippar/ARPwner
artillery 1.0.2 A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system https://www.trustedsec.com/downloads/artillery/
asleap 2.2 Actively recover LEAP/PPTP passwords. http://www.willhackforsushi.com/Asleap.html
asp-audit 2BETA An ASP fingerprinting tool and vulnerability scanner. http://seclists.org/basics/2006/Sep/128
athena-ssl-scanner 0.5.2 a SSL cipher scanner that checks all cipher codes. It can identify about 150 different ciphers. http://packetstormsecurity.com/files/93062/Athena-SSL-Cipher-Scanner.html
atstaketools 0.1 This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics. http://packetstormsecurity.com/files/50718/AtStakeTools.zip.html
autopsy 2.24 A GUI for The Sleuth Kit. http://www.sleuthkit.org/autopsy
azazel 10.401e3aa A userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. https://github.com/chokepoint/azazel
backcookie 44.cbf5b8b Small backdoor using cookie. https://github.com/mrjopino/backcookie
XDA Forums
[UTIL][SEPT 17, 2024] Apktool - Tool for reverse engineering apk files
Originally Posted by Brut.all, Updated by iBotPeaches
It is a tool for re-engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after...
It is a tool for re-engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after...
NSA shares list of vulnerabilities commonly exploited to plant web shells
https://www.zdnet.com/article/nsa-shares-list-of-vulnerabilities-commonly-exploited-to-plant-web-shells/
https://www.zdnet.com/article/nsa-shares-list-of-vulnerabilities-commonly-exploited-to-plant-web-shells/
ZDNET
NSA shares list of vulnerabilities commonly exploited to plant web shells
NSA and ASD issue joint advisory on detecting and dealing with web shells.
💥 WP-Advanced-Search < 3.3.7 - Authenticated SQL Injection
✅ 3.3.7
🔗 https://wordpress.org/plugins/wp-advanced-search/
ℹ️ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12104
✅ 3.3.7
🔗 https://wordpress.org/plugins/wp-advanced-search/
ℹ️ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12104
WordPress.org
WordPress WP-Advanced-Search
Moteur de recherche complet et puissant entièrement modulable (complete and powerful search engine, fully scalable).
MR. ROBOT
SERIE COMPLETA
Resolución: 1920×1080
Formato: MKV
Peso: 76GB
--
TEMPORADA 1
Audio #1: Ingles 5.1
Audio #2: Latino 5.1
Subtitulos: Latino
https://mega.nz/#F!114XGYpR!8eWmc5u0PYi9gZoVZPzf_Q
https://drive.google.com/drive/folders/1ne-AMcsuxEOrsTMrVtAOloS7umFvfIMD?usp=sharing
----
TEMPORADA 2
Audio #1: Ingles 5.1
Audio #2: Latino 5.1
Subtitulos: Latino
https://mega.nz/#F!c54RnC7S!32CK8VNKob3q3XhFJCxhnQ
https://drive.google.com/drive/folders/11KGlt--F56wmOYP9FQL69pbeCNjFiR15?usp=sharing
----
TEMPORADA 3
Audio #1: Ingles 5.1
Audio #2: Latino 5.1
Subtitulos: Latino
https://mega.nz/#F!h9xXEATA!ZGcENvXT0jOpGfBVfKhMcQ
https://drive.google.com/drive/folders/1Mo6IJ1WP7_O7bKsJJozjFWnewvoC0J-6?usp=sharing
---
TEMPORADA 4
Audio : Ingles 5.1
Subtitulos: Latino
https://mega.nz/#F!k9IzGIxD!iy3ZZVqAR-PxyRHG6leABQ
SERIE COMPLETA
Resolución: 1920×1080
Formato: MKV
Peso: 76GB
--
TEMPORADA 1
Audio #1: Ingles 5.1
Audio #2: Latino 5.1
Subtitulos: Latino
https://mega.nz/#F!114XGYpR!8eWmc5u0PYi9gZoVZPzf_Q
https://drive.google.com/drive/folders/1ne-AMcsuxEOrsTMrVtAOloS7umFvfIMD?usp=sharing
----
TEMPORADA 2
Audio #1: Ingles 5.1
Audio #2: Latino 5.1
Subtitulos: Latino
https://mega.nz/#F!c54RnC7S!32CK8VNKob3q3XhFJCxhnQ
https://drive.google.com/drive/folders/11KGlt--F56wmOYP9FQL69pbeCNjFiR15?usp=sharing
----
TEMPORADA 3
Audio #1: Ingles 5.1
Audio #2: Latino 5.1
Subtitulos: Latino
https://mega.nz/#F!h9xXEATA!ZGcENvXT0jOpGfBVfKhMcQ
https://drive.google.com/drive/folders/1Mo6IJ1WP7_O7bKsJJozjFWnewvoC0J-6?usp=sharing
---
TEMPORADA 4
Audio : Ingles 5.1
Subtitulos: Latino
https://mega.nz/#F!k9IzGIxD!iy3ZZVqAR-PxyRHG6leABQ
mega.nz
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now
Nuevo malware bancario de Android roba contraseñas, datos privados y hace de keylogger
https://unaaldia.hispasec.com/2020/04/nuevo-malware-bancario-de-android-roba-contrasenas-datos-privados-y-hace-de-keylogger.html
https://unaaldia.hispasec.com/2020/04/nuevo-malware-bancario-de-android-roba-contrasenas-datos-privados-y-hace-de-keylogger.html
Una al Día
Nuevo malware bancario de Android roba contraseñas, datos privados y hace de keylogger
Se ha descubierto un nuevo tipo de malware bancario que abusa de las funciones de accesibilidad de Android para extraer datos confidenciales de aplicaciones financieras, leer mensajes SMS de usuarios y secuestrar códigos de doble factor de autenticación.…