cKure
@cKure
6.6K
subscribers
1.35K
photos
320
videos
270
files
12K
links
﷽
This channel was created in 2018 and contains content from the information security domain.
This channel is primarily run by AI bots (n8n).
Archive:
ckure.esy.es
Criticals:
@ckuRED
linkedin.com/company/ckure
Support
📨
i@ckure.org
Download Telegram
Join
cKure
6.6K subscribers
cKure
☆☆☆☆☆
https://www.humblebundle.com/books/cybersecurity-wiley-books
Humble Bundle
Humble Book Bundle: Cybersecurity 2.0 by Wiley
Pay what you want for awesome ebooks and support charity!
cKure
https://www.blackhillsinfosec.com/how-to-bypass-application-whitelisting-av/
Black Hills Information Security, Inc.
How to Bypass Application Whitelisting & AV - Black Hills Information Security, Inc.
Brian Fehrman // There are numerous methods that have been published to bypass Anti-Virus products. As a result, many companies are beginning to realize that application whitelisting is another tool […]
cKure
http://www.hackingarticles.in/post-exploitation-using-wmic-system-command/
Hacking Articles
Post Exploitation Using WMIC (System Command)
This article is about Post Exploitation using the WMIC (Windows Management Instrumentation Command Line). When an Attacker gains a meterpreter session on a Remote PC,
cKure
https://n0where.net/linux-network-analyzer-netsniff-ng
cKure
https://github.com/deepzec/Win-PortFwd/
GitHub
GitHub - deepzec/Win-PortFwd: Powershell script to setup windows port forwarding using native netsh client
Powershell script to setup windows port forwarding using native netsh client - deepzec/Win-PortFwd
cKure
https://gist.github.com/williballenthin/1c2bc539041ee3bea7a4c7129072a9ac
Gist
IDA Pro script to identify functions that are referenced as data.
IDA Pro script to identify functions that are referenced as data. - functions_as_data.py
cKure
https://www.pentestpartners.com/security-blog/hacking-the-bitfi-part-1/
Pentestpartners
Hacking the Bitfi. Part 1 | Pen Test Partners
A large number of security researchers have taken exception to the ‘unhackable’ claims made by Bitfi and John McAfee about the security of their hardware cryptocurrency wallet. The $100K bounty offered appears to be something of sham, given it covers a very…
cKure
https://n0where.net/ghost-phisher
cKure
https://n0where.net/open-source-vulnerability-assessment-and-management-archery
cKure
https://n0where.net/viproy-voip-penetration-testing-kit
cKure
https://blog.preempt.com/new-ldap-rdp-relay-vulnerabilities-in-ntlm
cKure
https://medium.com/@tomnomnom/making-a-blind-sql-injection-a-little-less-blind-428dcb614ba8
Medium
Making a Blind SQL Injection a Little Less Blind
Someone told me the other day that “no-one does SQL Injection by hand any more”. I want to tell you about a SQL Injection bug that I found…
cKure
cKure
Photo
cKure
☆☆☆☆☆
ICYMI
Re-Branded Shodan
https://2000.shodan.io/#/
cKure
https://n0where.net/automated-pentest-recon-scanner-sn1per
cKure
https://www.exploit-db.com/exploits/45100/
cKure
https://www.exploit-db.com/exploits/45124/
cKure
https://jmw.fyi/post/disclose-fb-intern-server-info-with-a-strange-poll
cKure
https://www.bleepingcomputer.com/news/security/microsoft-edge-flaw-lets-hackers-steal-local-files/
BleepingComputer
Microsoft Edge Flaw Lets Hackers Steal Local Files
Microsoft has fixed a vulnerability in the Edge browser that could be abused against older versions to steal local files from a user's computer.
cKure
https://www.mdsec.co.uk/2018/08/escaping-the-sandbox-microsoft-office-on-macos/
MDSec
Escaping the Sandbox - Microsoft Office on MacOS - MDSec
You’ve completed your recon, and found that your target is using MacOS… what next? With the increased popularity of MacOS in the enterprise, we are often finding that having phishing...
cKure
https://github.com/hasherezade/pe-sieve/blob/master/README.md
GitHub
pe-sieve/README.md at master · hasherezade/pe-sieve
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches). - hasherezade/pe-sieve