decentralising the Ai Industry, just some language model api's...
https://github.com/xtekky/gpt4free
https://github.com/xtekky/gpt4free
GitHub
GitHub - xtekky/gpt4free: The official gpt4free repository | various collection of powerful language models | opus 4.6 gpt 5.3…
The official gpt4free repository | various collection of powerful language models | opus 4.6 gpt 5.3 kimi 2.5 deepseek v3.2 gemini 3 - xtekky/gpt4free
From One Vulnerability to Another: Outlook Patch Analysis Reveals Important Flaw in Windows API
https://www.akamai.com/blog/security-research/important-outlook-vulnerability-bypass-windows-api
https://www.akamai.com/blog/security-research/important-outlook-vulnerability-bypass-windows-api
Akamai
From One Vulnerability to Another: Outlook Patch Analysis Reveals Important Flaw in Windows API | Akamai
Akamai researchers explore a new critical vulnerability in Windows that could lead to a bypass of CVE-2023-23397’s mitigation.
Babuk Source Code Sparks 9 Different Ransomware Strains Targeting VMware ESXi Systems
https://thehackernews.com/2023/05/babuk-source-code-sparks-9-new.html
https://thehackernews.com/2023/05/babuk-source-code-sparks-9-new.html
👍1
ApkHack-BackDoor - shell script that simplifies the process of adding a backdoor to any Android APK file
https://github.com/BitWalls-ops/ApkHack-BackDoor
https://github.com/BitWalls-ops/ApkHack-BackDoor
👌2
Apache-Dubbo-CVE-2023-23638-exp-main (1).zip
9 KB
Apache Dubbo CVE-2023-23638 exploit
Writing a Sliver C2 Powershell Stager with Shellcode Compression and AES Encryption
https://medium.com/@youcef.s.kelouaz/writing-a-sliver-c2-powershell-stager-with-shellcode-compression-and-aes-encryption-9725c0201ea8
https://medium.com/@youcef.s.kelouaz/writing-a-sliver-c2-powershell-stager-with-shellcode-compression-and-aes-encryption-9725c0201ea8
Medium
Writing a Sliver C2 Powershell Stager with Shellcode Compression and AES Encryption
Edit :
PEASS-ng - Privilege Escalation Awesome Scripts Suite
https://github.com/carlospolop/PEASS-ng
https://github.com/carlospolop/PEASS-ng
GitHub
GitHub - peass-ng/PEASS-ng: PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors) - peass-ng/PEASS-ng
👍1
CVE-2023-26818 - Bypass TCC with Telegram in macOS
https://danrevah.github.io/2023/05/15/CVE-2023-26818-Bypass-TCC-with-Telegram/
https://danrevah.github.io/2023/05/15/CVE-2023-26818-Bypass-TCC-with-Telegram/
Dan Revah’s Blog
CVE-2023-26818 - Bypassing TCC with Telegram in macOS
Preface
❤2
Exploiting Windows’ vulnerabilities with Hyper-V: A Hacker’s swiss army knife
https://reversing.info/posts/hyperdeceit/
https://github.com/Xyrem/HyperDeceit
https://reversing.info/posts/hyperdeceit/
https://github.com/Xyrem/HyperDeceit
Xyrem Engineering
Exploiting Windows' vulnerabilities with Hyper-V: A Hacker's swiss army knife
In this blog, we explore how to leverage the implementation of the Hyper-V virtualization technology to exploit and attack Windows systems and learn what measures should be taken to mitigate this vulnerability. Join us as we explore the world of Windows hacking…
#Avast Anti-Virus privileged arbitrary file create on virus restore (CVE-2023-1586)
https://the-deniss.github.io/posts/avast-privileged-arbitrary-file-create-on-restore/
https://the-deniss.github.io/posts/avast-privileged-arbitrary-file-create-on-restore/
the-deniss.github.io
Avast Anti-Virus privileged arbitrary file create on virus restore (CVE-2023-1586)
And today I’m sharing the report describing the vulnerability (CVE-2023-1586) in Avast file restore functionality and exploitation of this vulnerability to execute arbitrary code in the “NT AUTHORITY\SYSTEM” context
Multiple Vulnerabilities in Kiddoware Kids Place Parental Control Android App (CVE-2023-28153, CVE-2023-29078, CVE-2023-29079)
1) Login and registration returns password as MD5 hash
2) Stored XSS via device name in parent Dashboard
3) Possible CSRF attacks in parent Dashboard
4) Arbitrary File Upload to AWS S3 bucket
5) Disable Child App Restriction without Parent's notice
https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-kiddoware-kids-place-parental-control-android-app/
1) Login and registration returns password as MD5 hash
2) Stored XSS via device name in parent Dashboard
3) Possible CSRF attacks in parent Dashboard
4) Arbitrary File Upload to AWS S3 bucket
5) Disable Child App Restriction without Parent's notice
https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-kiddoware-kids-place-parental-control-android-app/
SEC Consult
Multiple Vulnerabilities in Kiddoware Kids Place Parental Control Android App
Multiple vulnerabilities have been identified in the Kiddoware Kids Place Parental Control Android App. Users of the parent's web dashboard can be attacked via cross site scripting or cross site request forgery vulnerabilities, or attackers may upload arbitrary…
👍1
A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities
https://github.com/teixeira0xfffff/KoodousFinder
https://github.com/teixeira0xfffff/KoodousFinder
GitHub
GitHub - HuntDownProject/KoodousFinder: A simple tool to allows users to search for and analyze android apps for potential security…
A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities - HuntDownProject/KoodousFinder
In this repository you will find sample code files for each day of the course "Python for OSINT. A 21-day course for beginners".
https://github.com/cipher387/python-for-OSINT-21-days
https://github.com/cipher387/python-for-OSINT-21-days
GitHub
GitHub - cipher387/python-for-OSINT-21-days: In this repository you will find sample code files for each day of the course "Python…
In this repository you will find sample code files for each day of the course "Python for OSINT. A 21-day course for beginners". - cipher387/python-for-OSINT-21-days
👍2
Mini.WebVM: Your own Linux box from Dockerfile, virtualized in the browser via WebAssembly
https://leaningtech.com/mini-webvm-your-linux-box-from-dockerfile-via-wasm/
https://leaningtech.com/mini-webvm-your-linux-box-from-dockerfile-via-wasm/
Leaning Technologies Developer Hub
Mini.WebVM: Your own Linux box from Dockerfile, virtualized in the browser via WebAssembly
WebVM is a Linux-like virtual machine running fully client-side in the browser. It is based on CheerpX: a x86 execution engine in WebAssembly by Leaning Technologies. With today’s update, you can deploy your own version of WebVM by simply forking the repository…
👍2