Hacking Brasil
240 subscribers
74 photos
21 videos
20 files
219 links
Think correctly about hacking!
By: @hxcking
Download Telegram
Forwarded from Jame Time
IDAPro_9.0_Setup_&_Crack.7z
450.7 MB
USEM SEMPRE EM MÁQUINAS VIRTUAIS
Forwarded from Jame Time
PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms (2024)
Forwarded from Jame Time
Linux for Pentesting & Bug Bounties

Informações: https://hacktify.thinkific.com/courses/linux-for-pentesting-bug-bounties
photo_2024-07-31_08-39-43.jpg
145.9 KB
🚀 List of Bug Bounty Commands
Forwarded from Jame Time
Drone Wi-Fi Hacking (W33)

@hacking_bra
Exploit for Windows Kernel-Mode Driver Elevation of Privilege Flaw (CVE-2024-35250)

The vulnerability lies within the handling of property requests in the ks.sys driver. Specifically, when the KSPROPERTY_TYPE_UNSERIALIZESET flag is provided, a series of operations can be initiated that ultimately lead to arbitrary IOCTL calls. During this process, the user-supplied buffer is copied into a newly allocated space and executed without proper validation.
Cracking Windows Kernel with HEVD

🔗 Link - Part 0
🔗 Link - Part 1
🔗 Link - Part 2
🔗 Link - Part 3
🔗 Link - Part 4
Linux Malware Development:
Создание reverse shell на основе TLS/SSL на Python
*
writeUP
*
source: reverse_ssl.py
tomcat CVE-2024-50379/CVE-2024-56337
*
Прокачанная версия
👍1
Tunelamento SSH: exemplos, comando, configuração do servidor

https://www.ssh.com/academy/ssh/tunneling-example
MASTG_1-7-0.pdf
26.5 MB
OWASP Mobile Application Security Testing Guide, Ver.1.7.0, 2023

@Hacking_bra
🔥🔥 SCADA/ICS Hacking and Security🔥🔥

SCADA/ICS systems are among the greatest concerns for cyber warfare/cyber defense organizations. These systems are particularly vulnerable for a number of reasons, including-- but not limited to--the fact that so many SCADA/ICS organizations have relied upon security through obscurity for so many years. These industrial control systems are critical to any nation's infrastructure and, thereby, their economy. In this section, we will be showing how these systems can be found, hacked and controlled. Link