Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Android hacking :
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/EntySec/ghost.git
2) cd ghost
3) chmod +x install.sh
4) ./install.sh
> Simple and clear UX/UI.
Ghost Framework has a simple and clear UX/UI.
It is easy to understand and it will be easier
for you to master the Ghost Framework.
> Device shell access.
-Ghost Framework has the ability to access the remote Android
-device shell without using OpenSSH or other protocols.
Controlling device screen
_Ghost Framework has the ability to access device screen
and control it remotely using mouse and keyboard.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Android hacking :
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/EntySec/ghost.git
2) cd ghost
3) chmod +x install.sh
4) ./install.sh
> Simple and clear UX/UI.
Ghost Framework has a simple and clear UX/UI.
It is easy to understand and it will be easier
for you to master the Ghost Framework.
> Device shell access.
-Ghost Framework has the ability to access the remote Android
-device shell without using OpenSSH or other protocols.
Controlling device screen
_Ghost Framework has the ability to access device screen
and control it remotely using mouse and keyboard.
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - EntySec/Ghost: Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotelyβ¦
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. - EntySec/Ghost
Forwarded from DailyCVE
π΅Multiple vulnerabilities in Ubuntu Kernel:
https://dailycve.com/multiple-vulnerabilities-ubuntu-kernel
https://dailycve.com/multiple-vulnerabilities-ubuntu-kernel
Dailycve
Multiple vulnerabilities in Ubuntu Kernel | CVE
Details:
The system could be made to crash or expose sensitive information
under certain conditions.
Minh Yuan discovered that the framebuffer console driver in the Linux
kernel did not properly handle fonts in some conditions. A local attacker
couldβ¦
The system could be made to crash or expose sensitive information
under certain conditions.
Minh Yuan discovered that the framebuffer console driver in the Linux
kernel did not properly handle fonts in some conditions. A local attacker
couldβ¦
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
The U.S. states that digital taxes are discriminatory in India, Italy, and Turkey, but will not take any action for the time being.
#International
#International
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Data hacking exercices :
"Hacking in the sense of deconstructing an idea, hardware, anything and getting it to do something it wasnβt intended or to better understand how something works." (BSides CFP)
So hacking here means we want to quickly deconstruct data, understand what we've got and how to best utilize it for the problem at hand.
The primary motivation for these exercises is to explore the nexus of IPython, Pandas and Scikit Learn on security data of various kinds. The exercises will often intentionally show common missteps, warts in the data, paths that didn't work out that well and results that could definitely be improved upon. In general we're trying to capture what worked and what didn't, not only is that more realistic but often much more informative to the reader. :)
Download:
https://github.com/SuperCowPowers/data_hacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Data hacking exercices :
"Hacking in the sense of deconstructing an idea, hardware, anything and getting it to do something it wasnβt intended or to better understand how something works." (BSides CFP)
So hacking here means we want to quickly deconstruct data, understand what we've got and how to best utilize it for the problem at hand.
The primary motivation for these exercises is to explore the nexus of IPython, Pandas and Scikit Learn on security data of various kinds. The exercises will often intentionally show common missteps, warts in the data, paths that didn't work out that well and results that could definitely be improved upon. In general we're trying to capture what worked and what didn't, not only is that more realistic but often much more informative to the reader. :)
Download:
https://github.com/SuperCowPowers/data_hacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - SuperCowPowers/data_hacking: Data Hacking Project
Data Hacking Project. Contribute to SuperCowPowers/data_hacking development by creating an account on GitHub.
Forwarded from DailyCVE
π΅Liberty for Java : Multiple vulnerabilities ibm :
https://dailycve.com/liberty-java-multiple-vulnerabilities-ibm
https://dailycve.com/liberty-java-multiple-vulnerabilities-ibm
Dailycve
Liberty for Java : Multiple vulnerabilities ibm | CVE
Details:
CVEID: CVE-2020-14792
DESCRIPTION: An unspecified vulnerability in Java SE related to the Hotspot component could allow an unauthenticated attacker to cause low confidentiality impact, low integrity impact, and no availability impact.
CVSSβ¦
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Infect Any Android Device With Virus From Link In Termux:
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
apt-get update -y
apt-get upgrade -y
pkg install python -y
pkg install python2 -y
pkg install git -y
pip install lolcat
git clone https://github.com/noob-hackers/infect
cd $HOME
ls
cd infect
ls
bash infect.sh
[+]-- Now you need internet connection to continue further
process...
[+]-- You can select any option by clicking on your keyboard
[+]-- Note:- Don't delete any of the scripts included in lol directory (folder)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Infect Any Android Device With Virus From Link In Termux:
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
apt-get update -y
apt-get upgrade -y
pkg install python -y
pkg install python2 -y
pkg install git -y
pip install lolcat
git clone https://github.com/noob-hackers/infect
cd $HOME
ls
cd infect
ls
bash infect.sh
[+]-- Now you need internet connection to continue further
process...
[+]-- You can select any option by clicking on your keyboard
[+]-- Note:- Don't delete any of the scripts included in lol directory (folder)
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - noob-hackers/infect: Infect Any Android Device With Virus From Link In Termux
Infect Any Android Device With Virus From Link In Termux - noob-hackers/infect
Forwarded from DailyCVE
π΅Green Packet WiMax DV-360 command injection vulnerability :
-shell avaible
https://dailycve.com/green-packet-wimax-dv-360-command-injection-vulnerability
-shell avaible
https://dailycve.com/green-packet-wimax-dv-360-command-injection-vulnerability
Dailycve
Green Packet WiMax DV-360 command injection vulnerability | CVE
Details:
The Green Packet WiMax DV-360 is a router suitable for Green Packet business homes in the United States. WiMax DV-360 2.10.14-g1.0.6.1 Green Packet has a security flaw that enables command injection, unauthenticated remote execution of commandsβ¦
The Green Packet WiMax DV-360 is a router suitable for Green Packet business homes in the United States. WiMax DV-360 2.10.14-g1.0.6.1 Green Packet has a security flaw that enables command injection, unauthenticated remote execution of commandsβ¦
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
The prefecture of Fukuoka leaks data on 9,500 corona-positive persons, errors in sending emails, and errors in fixing access rights.
#Leaks
#Leaks
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
NVIDIA released the first version of the graphics card driver GeForce 461.09 in 2021.
#Updates #Technologies
#Updates #Technologies
Forwarded from DailyCVE
π΅Vulnerability of insufficient authentication in multiple products made by NEC that make RMCP connection by IPMI over LAN:
https://dailycve.com/vulnerability-insufficient-authentication-multiple-products-made-nec-make-rmcp-connection-ipmi-over
https://dailycve.com/vulnerability-insufficient-authentication-multiple-products-made-nec-make-rmcp-connection-ipmi-over
Dailycve
Vulnerability of insufficient authentication in multiple products made by NEC that make RMCP connection by IPMI over LAN | CVE
Details:
The Remote Management Control Protocol (RMCP) for accessing the BMC over a LAN is defined by the Intelligent Platform Management Interface (IPMI) specification v1.5 for remote monitoring and management of hardware status.
Some devices suppliedβ¦