Real profit
2.88K subscribers
107 photos
4 videos
155 files
3.37K links
Just invest your time
Download Telegram
Another meterpreter injection technique using C# that attempts to bypass Defender
https://github.com/plackyhacker/Suspended-Thread-Injection

A collection of C# shellcode injection techniques All techniques use an AES encrypted meterpreter payload
https://github.com/plackyhacker/Shellcode-Injection-Techniques

An example of using Syscalls in C# to get a meterpreter shell
https://github.com/plackyhacker/Sys-Calls

A simple shell code encryptor/decryptor/executor to bypass anti virus
https://github.com/plackyhacker/Shellcode-Encryptor

Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique
https://github.com/plackyhacker/Unhook-BitDefender
Applications that reproduce #CVE-2021-22119
https://github.com/mari6274/oauth-client-exploit

Generate malicious files using recently published homoglyphic-attack #CVE-2021-42694
https://github.com/js-on/CVE-2021-42694

metasploit script #poc about #CVE-2021-36260
https://github.com/TaroballzChen/CVE-2021-36260-metasploit
Burp-Suite_Pro 2021.10.7z
489 MB
Burp Suite Pro
version : 2021.10

Released
1 November 2021
Some docker images to play with #CVE-2021-41773 and #CVE-2021-42013
https://github.com/Hydragyrum/CVE-2021-41773-Playground

#CVE-2021-42663 HTML Injection vulnerability in the Online event booking and reservation system
https://github.com/TheHackingRabbi/CVE-2021-42663
#Sudomy to collect subdomains and analyzing domains performing automated reconnaissance #recon for bug hunting / #pentesting

https://github.com/screetsec/Sudomy
#shad0w, it provides the operator the ability to execute .NET assemblies, DLLs, EXEs, JS, VBS or XSLs fully inside memory. Dynamically resolved syscalls are heavily used to avoid userland API hooking, anti DLL #injection to make it harder for EDR to load code into the beacons and official Microsoft mitigation methods to protect spawn processes

https://github.com/bats3c/shad0w
A collection of more than 160+ tools, scripts, cheatsheets and other loots for Red Teaming / #Pentesting / IT Security audits purposes
https://github.com/mgeeky/Penetration-Testing-Tools

An advanced in-memory evasion technique fluctuating #shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
https://github.com/mgeeky/ShellcodeFluctuation

#poc for an advanced In-Memory evasion technique allowing to better hide injected #shellcode's memory allocation from scanners and analysts
https://github.com/mgeeky/ThreadStackSpoofer

PHP Script intdended to be used during #Phishing campaigns as a credentials collector linked to #backdoored HTML <form> action parameter
https://github.com/mgeeky/PhishingPost
Automate installation of extra #pentest_tools on #Kali_Linux, The script will create two directories within CWD: tools and www. The first one contains all the tools that will be installed on Kali, The second one contains all the scripts and binaries that will be downloaded and may be delivered onto the victim host later

https://github.com/penetrarnya-tm/WeaponizeKali.sh
The Engineers Online Portal System

#CVE-2021-42662 - Stored Cross-Site Scripting vulnerability in the Online event booking and reservation system
https://github.com/TheHackingRabbi/CVE-2021-42662

#CVE-2021-42663 - HTML Injection vulnerability in the Online event booking and reservation system
https://github.com/TheHackingRabbi/CVE-2021-42663

#CVE-2021-42664 - Stored Cross-Site Scripting vulnerability in the Engineers online portal system
https://github.com/TheHackingRabbi/CVE-2021-42664

#CVE-2021-42665 - SQL Injection authentication bypass vulnerability in the Engineers online portal system
https://github.com/TheHackingRabbi/CVE-2021-42665

#CVE-2021-42666 - SQL Injection vulnerability in the Engineers online portal system
https://github.com/TheHackingRabbi/CVE-2021-42666

#CVE-2021-42667 - SQL Injection vulnerability in the Online event booking and reservation system
https://github.com/TheHackingRabbi/CVE-2021-42667
#RSA attack tool ( mainly for ctf ) retreive private key from weak public key and / or uncipher data

https://github.com/Ganapati/RsaCtfTool
#tor_rootkit Standalone executables for Windows and Linux, including python interpreter and tor
the whole communication works over tor hidden services which guarantees some degree of anonymity, The Listener can handle multiple clients
and generates payloads for different platforms on startup

https://github.com/emcruise/tor-rootkit
#CVE-2021-38001 #chrome #exploit
#poc CVE-2021-38001 tested on macOS exploit has super dependent for my macOS d8 environment
https://github.com/vngkv123/aSiagaming/tree/master/Chrome-v8-1260577

the first part of a series on the chrome browser and its javascript engine v8
https://seal9055.com/blog/browser/browser/chrome_browser_architecture
#Exploit for #CVE-2021-40449
Win32k Elevation
https://github.com/Kristal-g/CVE-2021-40449_poc

#poc for #CVE-2021-36799
ETS5 Password Recovery
https://github.com/robertguetzkow/ets5-password-recovery

A sample #poc for #CVE-2021-30657
affecting MacOS
https://github.com/shubham0d/CVE-2021-30657

#Exploitation code for #CVE-2021-40539
Zoho ManageEngine ADSelfService Plus
https://github.com/synacktiv/CVE-2021-40539

VMWARE VCENTER SERVER VIRTUAL SAN HEALTH CHECK PLUG-IN RCE #CVE-2021-21985
https://github.com/sknux/CVE-2021-21985_PoC
Open-source code analysis platform for C/C++/Java/Binary/Javascript based on code property graphs
https://github.com/joernio/joern

#ExcelPeek is a tool designed to help investigate potentially malicious Microsoft Excel files
https://github.com/slaughterjames/excelpeek
REvil domain is back online
with a message .. .
" They are not the masters they think they are
We have the skills and experience
Do you want to be with the most qualified or losers ?
Summary of some offensive #vulnerabilities from mainstream vendors

https://github.com/r0eXpeR/supplier
#natpass A new generation of NAT intranet penetration tool, support tcp tunnel, shell tunnel

https://github.com/lwch/natpass
#Hardentools simply reduces the attack surface on Microsoft Windows by disabling low-hanging fruit risky features
https://github.com/securitywithoutborders/hardentools

#RPC_Firewall to audit all remote RPC calls. Once executing any remote attack tools, you will see which RPC UUIDs and Opnums were called remotely
https://github.com/zeronetworks/rpcfirewall
A Zeek package to detect #CVE-2021-42292, a Microsoft Excel local privilege escalation #exploit

https://github.com/corelight/CVE-2021-42292#detection-method