intell 137
96 subscribers
31 photos
13 files
62 links
Cyber intelligence team

Intell links: @intell666
Download Telegram
Channel created
if you need to find the POC for a specific CVE

1. Just a list of CVEs and links to POCs for them https://raw.githubusercontent.com/tg12/PoC_CVEs/main/cve_links.txt

2. There is also a method: specify the CVE you need in the cve_id parameter (the result in the screenshots cve_id

curl 'https://poc-in-github.motikan2010.net/api/v1/?cve_id=cve-2021-44228' | jq | grep html_url
👁 OSINT. Коллекция коллекций. Тысячи инструментов и ресурсов для изучения. Часть 1.

• Не буду подробно расписывать про OSINT, Вы и так все знаете сами. Сегодня поделюсь с тобой ссылками на различные ресурсы по данной тематике. Можно найти любую информацию, от блогов и полезных статей до уникальных инструментов:

ASINT by JK;
Search by Jlitz88;
OSINT Collection;
OSINT by Themis;
Hungarian OSINT;
WebNoser OSINT;
Crypto Resources;
OSINT by Mercure;
SecAno Resources;
Various Resources;
OSINT by Azule Onyx;
Toolset by Julia Bayer;
Mappy/Maps by Zook;
Jake Crep's Resources;
OSINT by Adam Visnic;
Media Map (US media;
OSINT4ALL by Socmint;
OSINT Tools by t0ch13;
Australian OSINT by HZ;
Add-ons by Technisette;
Resources by Joe Garza;
Tutorials by Technisette;
Social Media Resources;
IMINT by Bruno Mortier;
OSINT by Bruno Mortier;
Toolkit by Bruno Mortier;
Geoint by Bruno Mortier;
PC Sec by Bruno Mortier;
Canada OSINT by Slickbit;
Use Snowflake to bypass censorship

Unlike VPNs, you do not need to install a separate application to connect to a Snowflake proxy and bypass censorship

https://snowflake.torproject.org
Photo Investigation Toolkit

Search by photo
Extracting metadata
Photoforensic tools
Fact-checking tools

▫️https://start.me/p/0PgzqO/photo-osint
A very good tool for collecting information from open sources. You can search documents, photos, social media, leaks, cars, cryptocurrencies and more.

https://inteltechniques.com/tools/

⚠️Don't forget to use a VPN when accessing these sites.
CVE-2022-30136 explained.
Windows Network File System flaw results in arbitrary code execution as SYSTEM.
https://www.theregister.com/AMP/2022/07/15/windows_nfs_patch/
Week in OSINT #2022-28 - sector035 - Geolocation with Mountains
https://www.linkedin.com/posts/eyran-millis_mountain-geolocating-tutorial-activity-6941996317795565568-JYvf
A few weeks ago Eyran Millis shared a tutorial on LinkedIn about using mountain ridges in geolocation tasks. He goes over several use cases, and shows how one can use different sites to look for mountains and hills. Sites like PeakVisor, Peakery and Peakfinder are all included, and he gives some valuable tips on each of these. Thank you Eyran, for putting this guide together!
Malware Analysis Tools

A
collection of links to utilities and programs designed for malware analysis. Structured and intuitive resource, a large number of tools - these are the main advantages of the resource.

Encoding and decoding, analysis of pdf and word files, online scanners, utilities for working with memory, programs for decompilation

https://malwareanalysis.tools/
# General/Basic Exploitation

http://www.pentest-standard.org/index.php/Main_Page
https://www.offensive-security.com/metasploit-unleashed/
http://null-byte.wonderhowto.com/how-to/metasploit-basics/
https://www.owasp.org/index.php/Main_Page
https://github.com/nixawk/pentest-wiki
https://github.com/beefproject/beef
https://portswigger.net/burp/
https://www.metasploit.com/
http://exploitpack.com/
https://github.com/commixproject/commix
https://github.com/reverse-shell/routersploit

# Distros

https://www.kali.org/
https://www.blackarch.org/
https://www.parrotsec.org/

# Vulnscanner/Sniffer/Tools/Web Exploitation

http://www.askapache.com/security/computer-security-toolbox-2/#common_security_programs
https://pastebin.com/kP04r4PM
http://www.irongeek.com/i.php?page=backtrack-r1-man-pages/netdiscover
http://www.tenable.com/products/nessus-vulnerability-scanner
https://www.rapid7.com/products/nexpose/
https://cirt.net/nikto2
https://nmap.org/
https://github.com/netsniff-ng/netsniff-ng
https://www.wireshark.org/
https://github.com/fwaeytens/dnsenum/
https://github.com/makefu/dnsmap/
http://www.tcpdump.org/
http://sqlmap.org/
https://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project
https://wpscan.org/
http://networksecuritytoolkit.org/nst/index.html
https://github.com/droope/droopescan
https://github.com/andresriancho/w3af
https://www.netsparker.com/

# Password Cracker

http://www.openwall.com/john/
http://hashcat.net/hashcat/

# Online Tools

http://crackstation.net
http://www.tcpiputils.com/
https://shodan.io

# Exploits (Exploit/Vulnerability Databases)

https://exploit-db.com/
http://kernel-exploits.com
https://github.com/PenturaLabs/Linux_Exploit_Suggester
https://nvd.nist.gov/
https://www.us-cert.gov/
https://blog.osvdb.org/
http://www.securityfocus.com/
http://seclists.org/fulldisclosure/
https://technet.microsoft.com/en-us/security/bulletins
https://technet.microsoft.com/en-us/security/advisories
https://packetstormsecurity.com/
http://www.securiteam.com/
http://cxsecurity.com/
https://www.vulnerability-lab.com/

# Payloads/Reverse Shells

https://www.veil-framework.com/framework/veil-evasion/
http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
https://highon.coffee/blog/reverse-shell-cheat-sheet/

# Info/Blogs/Techniques/etc

http://wiki.bash-hackers.org/scripting/style
https://www.corelan.be/index.php/articles/
https://www.veracode.com/security/xss
http://www.thegeekstuff.com/2012/02/xss-attack-examples/
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
https://thehackernews.com/
http://securityidiots.com/Web-Pentest/SQL-Injection/Basic-Union-Based-SQL-Injection.html
https://www.idontplaydarts.com/2011/02/using-php-filter-for-local-file-inclusion/
https://hakin9.org/voip-hacking-techniques/

# Lists

https://code.google.com/archive/p/hacktooldepot/downloads
http://tools.kali.org/tools-listing
http://sectools.org/
https://github.com/fffaraz/awesome-cpp
https://github.com/fffaraz/awesome-cpp
https://github.com/alebcay/awesome-shell
https://github.com/dreikanter/ruby-bookmarks
https://github.com/sorrycc/awesome-javascript
https://github.com/sindresorhus/awesome-nodejs
https://github.com/dloss/python-pentest-tools
https://github.com/ashishb/android-security-awesome
https://github.com/bayandin/awesome-awesomeness
https://github.com/paragonie/awesome-appsec
https://github.com/apsdehal/awesome-ctf
https://github.com/carpedm20/awesome-hacking
https://github.com/paralax/awesome-honeypots
https://github.com/clowwindy/Awesome-Networking
https://github.com/onlurking/awesome-infosec
https://github.com/rshipp/awesome-malware-analysis
https://github.com/caesar0301/awesome-pcaptools
https://github.com/sbilly/awesome-security
1
Break Security

Size
: 109.86 GB
Contains: 618 folders / 6065 files

https://mega.nz/folder/dA0RGLJQ#w3MIfnpUEXoRTaTufoFz_Q
🔥2