Real profit
2.87K subscribers
107 photos
4 videos
155 files
3.37K links
Just invest your time
Download Telegram
Test whether a container environment is vulnerable to container escapes via CVE-2022-0492
https://unit42.paloaltonetworks.com/cve-2022-0492-cgroups
Prophet Spider Exploits Citrix ShareFile Remote Code Execution Vulnerability CVE-2021-22941 to Deliver Webshell
https://www.crowdstrike.com/blog/prophet-spider-exploits-citrix-sharefile
Zen and the Art of SMM Bug Hunting | Finding, Mitigating and Detecting UEFI Vulnerabilities
https://www.sentinelone.com/labs/zen-and-the-art-of-smm-bug-hunting-finding-mitigating-and-detecting-uefi-vulnerabilities
One of the best sites
https://www.hackingarticles.in
steal victim images exact location device info and much more
https://github.com/swagkarna/Nivistealer
A toolkit that brings together penetration testing tools such as wireless tools, web tools, password cracking tools, etc
https://github.com/MyMeepSQL/OmegaDSToolkit
Rufus is a Dos tool written in Python3
https://github.com/billythegoat356/Rufus
Vulture is a tool written in Python3 allowing you to gain access
to all the files of the victim's computer without any permissions
https://github.com/billythegoat356/Vulture
Container Escape to Shadow Admin: GKE Autopilot Vulnerabilities
https://unit42.paloaltonetworks.com/gke-autopilot-vulnerabilities
Put an io_uring on it: Exploiting the Linux Kernel
https://www.graplsecurity.com/post/iou-ring-exploiting-the-linux-kernel
Reversing embedded device bootloader (U-Boot) - p.1
https://www.shielder.it/blog/2022/03/reversing-embedded-device-bootloader-u-boot-p.1
Russian government sites hacked in supply chain attack, This comes after the Russian government shared a list of more than 17,000 IP
https://www.bleepingcomputer.com/news/security/russian-government-sites-hacked-in-supply-chain-attack
Cybersecurity researchers at Proofpoint say they detected a 500% jump in attempted mobile malware attacks during the first few months of 2022, with significant peaks at the beginning and end of February
https://www.proofpoint.com/us/blog/email-and-cloud-threats/mobile-malware-surging-europe-look-biggest-threats
Tools for gathering information and actions forensic
https://github.com/danieldurnea/FBI-tools
What's up with in-the-wild exploits? Plus, what we're doing about it
https://security.googleblog.com/2022/03/whats-up-with-in-wild-exploits-plus.html
Oracle Access Manager Unauthenticated Attacker Vulnerability CVE-2021-35587
https://github.com/antx-code/CVE-2021-35587
PoC CVE-2021-30955 iOS 15.1 kernel Exp
https://github.com/tihmstar/desc_race-fun_public
PoC CVE-2022-24122 Linux Kernel
https://github.com/meowmeowxw/CVE-2022-24122