Hacking Brasil
240 subscribers
74 photos
21 videos
20 files
219 links
Think correctly about hacking!
By: @hxcking
Download Telegram
[OSEP-PEN300]-[2022]-offenseive_security_expert_penetration_tester

https://teraboxapp.com/s/1ukPQmfhzBxj6VnH5JwdXHg
Ec-Council | Drone Hacking Workshop

Download :
https://teraboxapp.com/s/1GV6U9bknGFhxGF5s2wGD9Q
CVE-2024-36401
*
RCE GeoServer
*
exploit
INE | eCPPT Penetration Testing Professional (NEW - 2024)

Download : https://1024terabox.com/s/1cVvLsmUf-Jb81Rawna24LQ

More info :https://security.ine.com/certifications/ecppt-certification/
pcap-did-what: Analyze pcaps with Zeek and a Grafana Dashboard https://github.com/hackertarget/pcap-did-what
duck.ai

Uma ferramenta de comunicação com chatbots feita pela DuckDuckGo. Gratuito, não requer cadastro (posiciona-se como anônimo e não coleta esses usuários) e muito rápido:

Turbo GPT-3.5
Claude 4 Haiku
Liama ​​​​3 70B
Mixtral 8x78
Fascinating C code: TCP sockets & HTTP file downloads using only ntdll exports (NtCreateFile & NtDeviceIoControlFile syscalls). Bypasses Winsock for low-level Windows networking.


https://www.x86matthew.com/view_post?id=ntsockets
👍1
A Universal Windows Bootkit
An analysis of the MBR bootkit referred to as “HDRoot”



https://williamshowalter.com/a-universal-windows-bootkit/
𝗢𝗪𝗔𝗦𝗣 𝗧𝗢𝗣 𝟭𝟬 - 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗹𝗲 𝗟𝗟𝗠 𝗔𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀

The OWASP Top 10 for LLMs is a list of the most critical vulnerabilities found in applications utilizing LLMs. It was created to provide developers, data scientists, and security experts with practical, actionable, and concise security guidance to navigate the complex and evolving terrain of LLM security.

Link 🔗:-
https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/wiki/Vulnerable-LLM-Applications
This media is not supported in your browser
VIEW IN TELEGRAM
Bluetooth-DOS-Attack

Tool idea:
Make it mandatory for nearby Bluetooth-enabled devices to connect to nearby Bluetooth-enabled devices such as speakers and other things.

https://github.com/Yasher201/Bluetooth-DOS-Attack
C2 Cloud - The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.

https://github.com/govindasamyarun/c2-cloud?tab=readme-ov-file#application-setup
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting [2024]
🔥1