How to steal NTLMv2 hashes using file download vulnerability in web application | Start With Linux | Mannu Linux
http://www.mannulinux.org/2018/12/how-to-steal-ntlmv2-hashes-using-file.html?m=1
http://www.mannulinux.org/2018/12/how-to-steal-ntlmv2-hashes-using-file.html?m=1
www.mannulinux.org
How to steal NTLMv2 hashes using file download vulnerability in web application
Learn Basic Concepts of Linux. Best site to learn Linux from beginner to Advanced.
awesome-windows-kernel-security-development/README.md at master · ExpLife0011/awesome-windows-kernel-security-development · GitHub
https://github.com/ExpLife0011/awesome-windows-kernel-security-development/blob/master/README.md
https://github.com/ExpLife0011/awesome-windows-kernel-security-development/blob/master/README.md
GitHub
awesome-windows-kernel-security-development/README.md at master · ExpLife0011/awesome-windows-kernel-security-development
windows kernel security development. Contribute to ExpLife0011/awesome-windows-kernel-security-development development by creating an account on GitHub.
GitHub - skelsec/pypykatz_agent_dn: Pypykatz agent implemented in .NET
https://github.com/skelsec/pypykatz_agent_dn
https://github.com/skelsec/pypykatz_agent_dn
GitHub
skelsec/pypykatz_agent_dn
Pypykatz agent implemented in .NET. Contribute to skelsec/pypykatz_agent_dn development by creating an account on GitHub.
A small game that helps improve your XSS skills! It dynamically generates (increasingly more difficult) levels for you to exploit XSS vulnerabilities. No level is the same. https://t.co/bch4wIOAO4
Python for Reverse Engineering #1: ELF Binaries - DEV Community 👩💻👨💻
https://dev.to/icyphox/python-for-reverse-engineering-1-elf-binaries-1fo4
https://dev.to/icyphox/python-for-reverse-engineering-1-elf-binaries-1fo4
DEV Community
Python for Reverse Engineering #1: ELF Binaries
That’s radare2. No, our scripts don’t look anything like this :(
Buil...
Buil...
Windows DHCP Client RCE
https://labs.mwrinfosecurity.com/advisories/windows-dhcp-client/
https://labs.mwrinfosecurity.com/advisories/windows-dhcp-client/
[Research] Java Serialization Objects (JSO): An Exploitation Guide | Rapid7
https://www.rapid7.com/research/report/exploiting-jsos/
https://www.rapid7.com/research/report/exploiting-jsos/
Rapid7
Rapid7 Labs - Trusted Cybersecurity Research
Port Forwarding in Windows | Windows OS Hub
http://woshub.com/port-forwarding-in-windows/
http://woshub.com/port-forwarding-in-windows/
Windows OS Hub
Configuring Port Forwarding in Windows | Windows OS Hub
You can configure network port forwarding in all Windows versions without using third-party tools. Using a port forwarding rule, you can redirect an incoming TCP connection (IPv4 or IPv6) from…
GitHub - Critical-Start/pastebin_scraper
https://github.com/Critical-Start/pastebin_scraper
https://github.com/Critical-Start/pastebin_scraper
sirdarckcat: [🌐💧💥] HTTP Cache Cross-Site Leaks
http://sirdarckcat.blogspot.com/2019/03/http-cache-cross-site-leaks.html?m=1
http://sirdarckcat.blogspot.com/2019/03/http-cache-cross-site-leaks.html?m=1
Blogspot
[🌐💧💥] HTTP Cache Cross-Site Leaks
In this blog post I want to talk about a cool type of attacks ( XSLeaks ) that are cooler than what most developers and security researchers...
Fuzzilli, JavaScript engine fuzzer, is now open source: https://t.co/2noeJIATVf
GitHub
googleprojectzero/fuzzilli
A JavaScript Engine Fuzzer. Contribute to googleprojectzero/fuzzilli development by creating an account on GitHub.
Authenticated Arbitrary Command Execution on PostgreSQL 9.3 > Latest
https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5
https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5
Medium
Authenticated Arbitrary Command Execution on PostgreSQL 9.3 > Latest
PostgreSQL from 9.3 to latest has functionality allowing the database superuser & users in the ‘pg_read_server_files’ to execute OS…
A macOS, post-exploit, red teaming framework built with python3 and JavaScript. It's designed to provide a collaborative and user friendly interface for operators, managers, and reporting throughout mac and linux based red teaming. https://github.com/its-a-feature/Apfell
GitHub
GitHub - its-a-feature/Mythic: A collaborative, multi-platform, red teaming framework
A collaborative, multi-platform, red teaming framework - its-a-feature/Mythic
GitHub - marco-lancini/goscan: Interactive Network Scanner
https://github.com/marco-lancini/goscan
https://github.com/marco-lancini/goscan
GitHub
GitHub - marco-lancini/goscan: Interactive Network Scanner
Interactive Network Scanner. Contribute to marco-lancini/goscan development by creating an account on GitHub.
GitHub - paranoidninja/CarbonCopy: A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux
https://github.com/paranoidninja/CarbonCopy
https://github.com/paranoidninja/CarbonCopy
GitHub
GitHub - paranoidninja/CarbonCopy: A tool which creates a spoofed certificate of any online website and signs an Executable for…
A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux - paranoidninja/CarbonCopy
GitHub - trustedsec/social-engineer-toolkit: The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
https://github.com/TrustedSec/social-engineer-toolkit
https://github.com/TrustedSec/social-engineer-toolkit
GitHub
GitHub - trustedsec/social-engineer-toolkit: The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of…
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here. - trustedsec/social-engineer-toolkit
Data Exfiltration | Azeria Labs
https://azeria-labs.com/data-exfiltration/
https://azeria-labs.com/data-exfiltration/
Azeria-Labs
Data Exfiltration