Some Tools and Scripts for ExploitDev (&& OSCE prep 😉)
#1 Wrapper for Spike Fuzzing (WriteUp: https://hansesecure.de/howto-exploitdev-fuzzing/)
#2 eggHunterShellcodes ready 4 Copy&Paste #3 Skeleton Exploits #infosec #pentest #exploitDev
#1 Wrapper for Spike Fuzzing (WriteUp: https://hansesecure.de/howto-exploitdev-fuzzing/)
#2 eggHunterShellcodes ready 4 Copy&Paste #3 Skeleton Exploits #infosec #pentest #exploitDev
Twitter
#infosec - Twitter Search / Twitter
See Tweets about #infosec on Twitter. See what people are saying and join the conversation.
Forwarded from Bug Bounty Channel
BeRoot For Windows : a post exploitation tool to check common Windows misconfigurations to find a way to escalate our privilege : https://github.com/AlessandroZ/BeRoot/tree/master/Windows
Privilege Escalation Project - Windows / Linux / Mac : https://github.com/AlessandroZ/BeRoot
Privilege Escalation Project - Windows / Linux / Mac : https://github.com/AlessandroZ/BeRoot
New Bluetooth Vulnerability (CVE-2018-5383)—Cryptographic implementation flaw in Firmware/Drivers affects devices from major vendors including Apple, Broadcom, Intel & Qualcomm. https://thehackernews.com/2018/07/bluetooth-hack-vulnerability.html
Attackers can intercept, decrypt, forge messages/traffic or inject malware.
Attackers can intercept, decrypt, forge messages/traffic or inject malware.