CVE-2020-0683:-- #Windows #MSI “Installer service” #Elevation of #Privilege.
#Download #Link:-
https://github.com/padovah4ck/CVE-2020-0683
CVE-2020-0683:-- #Windows #MSI “Installer service” #Elevation of #Privilege.
#Download #Link:-
https://github.com/padovah4ck/CVE-2020-0683
#Download #Link:-
https://github.com/padovah4ck/CVE-2020-0683
CVE-2020-0683:-- #Windows #MSI “Installer service” #Elevation of #Privilege.
#Download #Link:-
https://github.com/padovah4ck/CVE-2020-0683
Trojan-Qt5:-- A #cross-platform #trojan #GUI #client, based on Shadowsocks-qt.
Requirement:-
1. #Windows, #macOS, #Linux
2. c++ compiler(cl, clang, #gcc)
3. Qt 5.13.0 +
4. QHttpServer(follow the instruction below to install)
#Download #Link:-
https://github.com/TheWanderingCoel/Trojan-Qt5
Trojan-Qt5:-- A #cross-platform #trojan #GUI #client, based on Shadowsocks-qt.
Requirement:-
1. #Windows, #macOS, #Linux
2. c++ compiler(cl, clang, #gcc)
3. Qt 5.13.0 +
4. QHttpServer(follow the instruction below to install)
#Download #Link:-
https://github.com/TheWanderingCoel/Trojan-Qt5
Requirement:-
1. #Windows, #macOS, #Linux
2. c++ compiler(cl, clang, #gcc)
3. Qt 5.13.0 +
4. QHttpServer(follow the instruction below to install)
#Download #Link:-
https://github.com/TheWanderingCoel/Trojan-Qt5
Trojan-Qt5:-- A #cross-platform #trojan #GUI #client, based on Shadowsocks-qt.
Requirement:-
1. #Windows, #macOS, #Linux
2. c++ compiler(cl, clang, #gcc)
3. Qt 5.13.0 +
4. QHttpServer(follow the instruction below to install)
#Download #Link:-
https://github.com/TheWanderingCoel/Trojan-Qt5
Forwarded from سوريا الخبر
😊الليلة بقدر الامكان حاول انزلكم شروحات كتيرة عشان احتمال اختفي لان ممتحن 😊
اول شرح ح ابدأ nmap :
في ناس بتعرف تستخدم nmap بطريقة full options وناس بتعرف تستخدمها ك basic
طيب اهم طرق للبحث واخذ gathering info :
طرق الهجوم :
للبحث عن subnet نكتب الامر مثلا:
nmap 172.25.40.0/24
غالبا بكون (24-21-18-28)
طيب عاوزين نعمل range لل ip مثلا نكتب :
nmap 172.25.40.100-200
بعمل range لل ip بشوف متاح منها وبديك info عنه 😊
عاوز تعمل بحث عن ports لي مجموعة كبيرة من ip واضعهم في ملف مثلا
sd.txt
تكتب الاتي :
nmap -iL sd.txt
مثلا عاوز تعمل detect لل os or service تكتب :
nmap -A 172.25.40.132
عاوز تعمل aggressive service :
nmap -sV -version-inteversion-intenstversion-inteversion-intensity 10 172.25.40.132
طيب نخش في script مهم جدا :
الامر help لل script
nmap -script-help=ssl-heartbleed
عاوز تعرف netbois :
nmap -sU -script nbtstat.nse -p 172.25.40.140
عاوز تعرف paths لل ip او موقع :
nmap --script=http-enum
هذا الامر حلو جدا : لمعرفة وعمل ddos على UDP :
nmap -sU -A -PN -n -pu:92.53.121.161 - script=ntp-monlist,dns-recursion,snmp-sysdescr 172.16.44.2/24
#tipsnmap 😍
اول شرح ح ابدأ nmap :
في ناس بتعرف تستخدم nmap بطريقة full options وناس بتعرف تستخدمها ك basic
طيب اهم طرق للبحث واخذ gathering info :
طرق الهجوم :
للبحث عن subnet نكتب الامر مثلا:
nmap 172.25.40.0/24
غالبا بكون (24-21-18-28)
طيب عاوزين نعمل range لل ip مثلا نكتب :
nmap 172.25.40.100-200
بعمل range لل ip بشوف متاح منها وبديك info عنه 😊
عاوز تعمل بحث عن ports لي مجموعة كبيرة من ip واضعهم في ملف مثلا
sd.txt
تكتب الاتي :
nmap -iL sd.txt
مثلا عاوز تعمل detect لل os or service تكتب :
nmap -A 172.25.40.132
عاوز تعمل aggressive service :
nmap -sV -version-inteversion-intenstversion-inteversion-intensity 10 172.25.40.132
طيب نخش في script مهم جدا :
الامر help لل script
nmap -script-help=ssl-heartbleed
عاوز تعرف netbois :
nmap -sU -script nbtstat.nse -p 172.25.40.140
عاوز تعرف paths لل ip او موقع :
nmap --script=http-enum
هذا الامر حلو جدا : لمعرفة وعمل ddos على UDP :
nmap -sU -A -PN -n -pu:92.53.121.161 - script=ntp-monlist,dns-recursion,snmp-sysdescr 172.16.44.2/24
#tipsnmap 😍
AWSBucketDump:-- #Security #Tool to Look For Interesting Files in #S3 #Buckets.
#AWSBucketDump is a tool to quickly enumerate #AWS S3 buckets to look for loot. It's similar to a #subdomain #bruteforcer but is made specifically for S3 buckets and also has some extra features that allow you to grep for delicious files as well as download interesting files if you're not afraid to quickly fill up your #hard#drive.
Pre-Requisites:-
Non-Standard Python Libraries:-
1. xmltodict
2. requests
3. argparse
#Download #Link:-
https://github.com/jordanpotti/AWSBucketDump
AWSBucketDump:-- #Security #Tool to Look For Interesting Files in #S3 #Buckets.
#AWSBucketDump is a tool to quickly enumerate #AWS S3 buckets to look for loot. It's similar to a #subdomain #bruteforcer but is made specifically for S3 buckets and also has some extra features that allow you to grep for delicious files as well as download interesting files if you're not afraid to quickly fill up your #hard#drive.
Pre-Requisites:-
Non-Standard Python Libraries:-
1. xmltodict
2. requests
3. argparse
#Download #Link:-
https://github.com/jordanpotti/AWSBucketDump
#AWSBucketDump is a tool to quickly enumerate #AWS S3 buckets to look for loot. It's similar to a #subdomain #bruteforcer but is made specifically for S3 buckets and also has some extra features that allow you to grep for delicious files as well as download interesting files if you're not afraid to quickly fill up your #hard#drive.
Pre-Requisites:-
Non-Standard Python Libraries:-
1. xmltodict
2. requests
3. argparse
#Download #Link:-
https://github.com/jordanpotti/AWSBucketDump
AWSBucketDump:-- #Security #Tool to Look For Interesting Files in #S3 #Buckets.
#AWSBucketDump is a tool to quickly enumerate #AWS S3 buckets to look for loot. It's similar to a #subdomain #bruteforcer but is made specifically for S3 buckets and also has some extra features that allow you to grep for delicious files as well as download interesting files if you're not afraid to quickly fill up your #hard#drive.
Pre-Requisites:-
Non-Standard Python Libraries:-
1. xmltodict
2. requests
3. argparse
#Download #Link:-
https://github.com/jordanpotti/AWSBucketDump
Forwarded from سوريا الخبر
Forwarded from NusurTech 2 ©️
Purify:-- All-in-one tool for #managing #vulnerability #reports.
The goal of #Purify to be an easy-in-use and efficient tool to simplify a workflow of managing #vulnerabilities delivered from various #tools.
Purify is designed to #analyze the report of any tool if the report is in #JSON or #XML format. This means you don't need any special plug-ins to #process reports from your selection of tools.
Collect all #security findings in one place, review/validate/track them, collaborate, get notifications, export them into tracking systems (e.g. Jira) and so on.
The logic hierarchy of Purify is simple:
1. Project (the root component)
2. Units (the direct child of a project)
3. Reports (belong to a unit)
4. Templates (attached to a report and used to parse issues)
5. Issues (extracted from a report and formatted based on a template)
#Download #Link:-
https://github.com/faloker/purify
Purify:-- All-in-one tool for #managing #vulnerability #reports.
The goal of #Purify to be an easy-in-use and efficient tool to simplify a workflow of managing #vulnerabilities delivered from various #tools.
Purify is designed to #analyze the report of any tool if the report is in #JSON or #XML format. This means you don't need any special plug-ins to #process reports from your selection of tools.
Collect all #security findings in one place, review/validate/track them, collaborate, get notifications, export them into tracking systems (e.g. Jira) and so on.
The logic hierarchy of Purify is simple:
1. Project (the root component)
2. Units (the direct child of a project)
3. Reports (belong to a unit)
4. Templates (attached to a report and used to parse issues)
5. Issues (extracted from a report and formatted based on a template)
#Download #Link:-
https://github.com/faloker/purify
The goal of #Purify to be an easy-in-use and efficient tool to simplify a workflow of managing #vulnerabilities delivered from various #tools.
Purify is designed to #analyze the report of any tool if the report is in #JSON or #XML format. This means you don't need any special plug-ins to #process reports from your selection of tools.
Collect all #security findings in one place, review/validate/track them, collaborate, get notifications, export them into tracking systems (e.g. Jira) and so on.
The logic hierarchy of Purify is simple:
1. Project (the root component)
2. Units (the direct child of a project)
3. Reports (belong to a unit)
4. Templates (attached to a report and used to parse issues)
5. Issues (extracted from a report and formatted based on a template)
#Download #Link:-
https://github.com/faloker/purify
Purify:-- All-in-one tool for #managing #vulnerability #reports.
The goal of #Purify to be an easy-in-use and efficient tool to simplify a workflow of managing #vulnerabilities delivered from various #tools.
Purify is designed to #analyze the report of any tool if the report is in #JSON or #XML format. This means you don't need any special plug-ins to #process reports from your selection of tools.
Collect all #security findings in one place, review/validate/track them, collaborate, get notifications, export them into tracking systems (e.g. Jira) and so on.
The logic hierarchy of Purify is simple:
1. Project (the root component)
2. Units (the direct child of a project)
3. Reports (belong to a unit)
4. Templates (attached to a report and used to parse issues)
5. Issues (extracted from a report and formatted based on a template)
#Download #Link:-
https://github.com/faloker/purify