CryptoAPI:-- A #PoC for CVE-2020-0601
#Windows #CryptoAPI #Spoofing #Vulnerability #exploitation.
#Download #Link:-
https://github.com/kudelskisecurity/chainoffools
CryptoAPI:-- A #PoC for CVE-2020-0601
#Windows #CryptoAPI #Spoofing #Vulnerability #exploitation.
#Download #Link:-
https://github.com/kudelskisecurity/chainoffools
#Windows #CryptoAPI #Spoofing #Vulnerability #exploitation.
#Download #Link:-
https://github.com/kudelskisecurity/chainoffools
CryptoAPI:-- A #PoC for CVE-2020-0601
#Windows #CryptoAPI #Spoofing #Vulnerability #exploitation.
#Download #Link:-
https://github.com/kudelskisecurity/chainoffools
Forwarded from Anonymous TV
❌حصرياً❌
دوره تعلم لمحبي الشبكات👨💻👨💻(Networking)👨💻👨💻
مجانا على يوتيوب مع المدرب
Mr.Mohamed Alush👨🎓
والتي من خلالها ستتعلم برمجه اي مودم
1-Tp-link 🔧
2-netis 🔧
3-nanostaion 🔧
4-Mikrotik problem 🔧
والعديد من الفيديوهات المختصه في تعليم 💻الشبكات والميكروتيك بشكل عام من الرابط التالي - اشتراك + تفعيل الجرس فضلاً
https://www.youtube.com/playlist?list=PLrl1JxlDFimg3j-BOHiA6OO1dtHX449OE
دوره تعلم لمحبي الشبكات👨💻👨💻(Networking)👨💻👨💻
مجانا على يوتيوب مع المدرب
Mr.Mohamed Alush👨🎓
والتي من خلالها ستتعلم برمجه اي مودم
1-Tp-link 🔧
2-netis 🔧
3-nanostaion 🔧
4-Mikrotik problem 🔧
والعديد من الفيديوهات المختصه في تعليم 💻الشبكات والميكروتيك بشكل عام من الرابط التالي - اشتراك + تفعيل الجرس فضلاً
https://www.youtube.com/playlist?list=PLrl1JxlDFimg3j-BOHiA6OO1dtHX449OE
YouTube
دورة ضبط قطع الشبكات اللاسلكية
انشأنا هذه الدورة للاشخاص الذين لا يعرفون ضبط اعدادت بعض قطع الشبكات المنتشره بكثرة مثل الانتينات m2/m5 و الروترات
Qu1cksc0pe:-- Quick #suspicious #file #analysis #tool.
1. Usage before install: python3 qu1cksc0pe.py --file suspicious_file --category anything
2. Usage after install: qu1cksc0pe --file suspicious_file --category anything
#Download #Link:-
https://github.com/CYB3RMX/Qu1cksc0pe
Qu1cksc0pe:-- Quick #suspicious #file #analysis #tool.
1. Usage before install: python3 qu1cksc0pe.py --file suspicious_file --category anything
2. Usage after install: qu1cksc0pe --file suspicious_file --category anything
#Download #Link:-
https://github.com/CYB3RMX/Qu1cksc0pe
1. Usage before install: python3 qu1cksc0pe.py --file suspicious_file --category anything
2. Usage after install: qu1cksc0pe --file suspicious_file --category anything
#Download #Link:-
https://github.com/CYB3RMX/Qu1cksc0pe
Qu1cksc0pe:-- Quick #suspicious #file #analysis #tool.
1. Usage before install: python3 qu1cksc0pe.py --file suspicious_file --category anything
2. Usage after install: qu1cksc0pe --file suspicious_file --category anything
#Download #Link:-
https://github.com/CYB3RMX/Qu1cksc0pe
FUXI 2.0:-- #Penetration #Testing #Platform.
Installation:-
1. Depends on #Linux #python3 #redis #MongoDB
2. Create a configuration file instance/config.py Modify _config.py to config.py and
3. refine the configuration files such as redis and MongoDB
#Download #Link:-
https://github.com/jeffzh3ng/fuxi
FUXI 2.0:-- #Penetration #Testing #Platform.
Installation:-
1. Depends on #Linux #python3 #redis #MongoDB
2. Create a configuration file instance/config.py Modify _config.py to config.py and
3. refine the configuration files such as redis and MongoDB
#Download #Link:-
https://github.com/jeffzh3ng/fuxi
Installation:-
1. Depends on #Linux #python3 #redis #MongoDB
2. Create a configuration file instance/config.py Modify _config.py to config.py and
3. refine the configuration files such as redis and MongoDB
#Download #Link:-
https://github.com/jeffzh3ng/fuxi
FUXI 2.0:-- #Penetration #Testing #Platform.
Installation:-
1. Depends on #Linux #python3 #redis #MongoDB
2. Create a configuration file instance/config.py Modify _config.py to config.py and
3. refine the configuration files such as redis and MongoDB
#Download #Link:-
https://github.com/jeffzh3ng/fuxi
Photos from National Cyber Security Services's post
IPAPatch:-- Patch #iOS #Apps, The Easy Way, Without #Jailbreak.
Features:-
IPAPatch includes a template #Xcode project, that provides the following features:
1. Build & Run third-party #IPA with your code injected
2. Step-by-step #Debugging with lldb
3. Link external #frameworks
4. Generate distributable .ipa files
#Download #Link:-
https://github.com/Naituw/IPAPatch
IPAPatch:-- Patch #iOS #Apps, The Easy Way, Without #Jailbreak.
Features:-
IPAPatch includes a template #Xcode project, that provides the following features:
1. Build & Run third-party #IPA with your code injected
2. Step-by-step #Debugging with lldb
3. Link external #frameworks
4. Generate distributable .ipa files
#Download #Link:-
https://github.com/Naituw/IPAPatch
PyExploit:-- #Python #penetration #toolkit.
PyExploit v1.0 Python penetration toolkit can #automate everything for you.
Futures:-
1. #recon :
#Whois
#GeoIP
#Subdomains
#Shodan
PWNED
2. #Vulnerabilities :
#Clickjacking
#Download #Link:-
https://github.com/RiadhBenlamine/PyExploit
PyExploit:-- #Python #penetration #toolkit.
PyExploit v1.0 Python penetration toolkit can #automate everything for you.
Futures:-
1. #recon :
#Whois
#GeoIP
#Subdomains
#Shodan
PWNED
2. #Vulnerabilities :
#Clickjacking
#Download #Link:-
https://github.com/RiadhBenlamine/PyExploit
PyExploit v1.0 Python penetration toolkit can #automate everything for you.
Futures:-
1. #recon :
#Whois
#GeoIP
#Subdomains
#Shodan
PWNED
2. #Vulnerabilities :
#Clickjacking
#Download #Link:-
https://github.com/RiadhBenlamine/PyExploit
PyExploit:-- #Python #penetration #toolkit.
PyExploit v1.0 Python penetration toolkit can #automate everything for you.
Futures:-
1. #recon :
#Whois
#GeoIP
#Subdomains
#Shodan
PWNED
2. #Vulnerabilities :
#Clickjacking
#Download #Link:-
https://github.com/RiadhBenlamine/PyExploit
CSWSH:-- A #command-line tool for Cross-Site #WebSocket #Hijacking.
A command-line tool designed to test and connect to a WebSocket which are #vulnerable to Cross-Site WebSocket Hijacking vulnerability.
#CSWSH tool can connect to both standard and socket.io based WebSockets.
1. A standard WebSocket will have the functionality of sending messages to the server and receiving messages from the server.
2. A socket.io based WebSocket will have only the ping functionality to check if the connection is successful or not.
#Download #Link:-
https://github.com/DeepakPawar95/cswsh
CSWSH:-- A #command-line tool for Cross-Site #WebSocket #Hijacking.
A command-line tool designed to test and connect to a WebSocket which are #vulnerable to Cross-Site WebSocket Hijacking vulnerability.
#CSWSH tool can connect to both standard and socket.io based WebSockets.
1. A standard WebSocket will have the functionality of sending messages to the server and receiving messages from the server.
2. A socket.io based WebSocket will have only the ping functionality to check if the connection is successful or not.
#Download #Link:-
https://github.com/DeepakPawar95/cswsh
A command-line tool designed to test and connect to a WebSocket which are #vulnerable to Cross-Site WebSocket Hijacking vulnerability.
#CSWSH tool can connect to both standard and socket.io based WebSockets.
1. A standard WebSocket will have the functionality of sending messages to the server and receiving messages from the server.
2. A socket.io based WebSocket will have only the ping functionality to check if the connection is successful or not.
#Download #Link:-
https://github.com/DeepakPawar95/cswsh
CSWSH:-- A #command-line tool for Cross-Site #WebSocket #Hijacking.
A command-line tool designed to test and connect to a WebSocket which are #vulnerable to Cross-Site WebSocket Hijacking vulnerability.
#CSWSH tool can connect to both standard and socket.io based WebSockets.
1. A standard WebSocket will have the functionality of sending messages to the server and receiving messages from the server.
2. A socket.io based WebSocket will have only the ping functionality to check if the connection is successful or not.
#Download #Link:-
https://github.com/DeepakPawar95/cswsh