Invisi-Shell : Hide your Powershell script in plain sight (Bypass all Powershell security features) : https://t.co/Zsy5Bp4tJH
Presentation : Goodbye Obfuscation - Hello InvisiShell Hiding Your Powershell Script in Plain Sight : https://t.co/awYN09bcVE
Presentation : Goodbye Obfuscation - Hello InvisiShell Hiding Your Powershell Script in Plain Sight : https://t.co/awYN09bcVE
GitHub
OmerYa/Invisi-Shell
Hide your Powershell script in plain sight. Bypass all Powershell security features - OmerYa/Invisi-Shell
This repository contains all the noise and artifacts surrounding the development of a new implementation of #Meterpreter that is intended to run on the CLR.
https://t.co/8qKOnis9N7
https://t.co/8qKOnis9N7
GitHub
OJ/clr-meterpreter
The full story of the CLR implementation of Meterpreter - OJ/clr-meterpreter
GitHub - Pure-L0G1C/Loki: Remote Access Tool/Botnet
https://github.com/Pure-L0G1C/Loki
https://github.com/Pure-L0G1C/Loki
GitHub
GitHub - Bitwise-01/Loki: Remote Access Tool
Remote Access Tool. Contribute to Bitwise-01/Loki development by creating an account on GitHub.
Building an Office macro to spoof parent processes and command line arguments - Christophe Tafani-Dereeper
https://blog.christophetd.fr/building-an-office-macro-to-spoof-process-parent-and-command-line/
https://blog.christophetd.fr/building-an-office-macro-to-spoof-process-parent-and-command-line/
File Path Traversal and File Inclusions – Asfiya Shaikh – Medium
https://medium.com/@asfiyashaikh10/file-path-traversal-and-file-inclusions-7c567da9e226
https://medium.com/@asfiyashaikh10/file-path-traversal-and-file-inclusions-7c567da9e226
Medium
File Path Traversal and File Inclusions(LFI / RFI)
There exist hell lot of information over internet that can help you understand these vulnerabilities, However i will also help you with…
How I hacked 50+ Companies in 6 hrs – Vignesh C – Medium
https://medium.com/@cvignesh28/how-i-hacked-50-companies-in-6-hrs-3866b61cfdcc
https://medium.com/@cvignesh28/how-i-hacked-50-companies-in-6-hrs-3866b61cfdcc
Medium
How I hacked 50+ Companies in 6 hrs
Long story short, I have created my Hackerone/Bugcrowd profiles a way back in 2016 but I have never reported a bug there. I have never…
Evil Clippy - A Cross-Platform Assistant For Creating Malicious MS Office Documents
http://amp.kitploit.com/2019/04/evil-clippy-cross-platform-assistant.html?amp=0
http://amp.kitploit.com/2019/04/evil-clippy-cross-platform-assistant.html?amp=0
KitPloit - PenTest & Hacking Tools
Evil Clippy - A Cross-Platform Assistant For Creating Malicious MS Office Documents
The inception bar: a new phishing method
https://jameshfisher.com/2019/04/27/the-inception-bar-a-new-phishing-method/
https://jameshfisher.com/2019/04/27/the-inception-bar-a-new-phishing-method/
jameshfisher.com
The inception bar: a new phishing method
A new phishing technique that displays a fake URL bar in Chrome for mobile. A key innovation is the "scroll jail" that traps the user in a fake browser.
Your nmap http scripts returning nothing? Might be because there's a block on nmap's default user agent. Either correct by modifying http.lua or use a script arg.
https://t.co/tvGiSmmGAc
https://t.co/g0K3L4CPwH
Here's my nmap alias: https://t.co/WtLBfp3Tm2
https://t.co/tvGiSmmGAc
https://t.co/g0K3L4CPwH
Here's my nmap alias: https://t.co/WtLBfp3Tm2
Kroosec
Making Nmap Scripting Engine stealthier
Nmap comes with NSE : a fully integrated scripting engine with many useful libraries. The http library is one I've come to use oftenbut I...
GitHub - sk3ptre/AndroidMalware_2019: Popular Android threats in 2019
https://github.com/sk3ptre/AndroidMalware_2019
https://github.com/sk3ptre/AndroidMalware_2019
GitHub
GitHub - sk3ptre/AndroidMalware_2019: Popular Android threats in 2019
Popular Android threats in 2019. Contribute to sk3ptre/AndroidMalware_2019 development by creating an account on GitHub.
Remote code execution On Microsoft edge URL Protocol
https://medium.com/@mattharr0ey/remote-code-execution-on-microsoft-edge-url-protocol-a67d0f96b32d
https://medium.com/@mattharr0ey/remote-code-execution-on-microsoft-edge-url-protocol-a67d0f96b32d
Medium
Remote code execution On Microsoft edge using URL Protocol
Introduction
Pentesters Guide to Oracle Hacking – Netscylla Cyber Security – Medium
https://medium.com/@netscylla/pentesters-guide-to-oracle-hacking-1dcf7068d573
https://medium.com/@netscylla/pentesters-guide-to-oracle-hacking-1dcf7068d573
Medium
Pentesters Guide to Oracle Hacking
A colleague encountered Oracle for the first time this week! Yes, you guessed it, they popped their Oracle DB Cherry! So attached is a…
Dexcalibur - an automatic DBI tool for Android powered by Frida with a GUI
https://t.co/4WBJUrTfJX
https://t.co/4WBJUrTfJX
GitHub
FrenchYeti/dexcalibur
Dynamic binary instrumentation tool designed for Android application and powered by Frida. It desassemble dex, analyze, can generate hook, stored intercepted data automatically and do new things fr...
Malicious DLL execution using Apple's APSDaemon.exe signed binary - Malware - 0x00sec - The Home of the Hacker
https://0x00sec.org/t/malicious-dll-execution-using-apples-apsdaemon-exe-signed-binary/13409
https://0x00sec.org/t/malicious-dll-execution-using-apples-apsdaemon-exe-signed-binary/13409
GitHub - 0vercl0k/CVE-2019-9810: Exploit for CVE-2019-9810 Firefox on Windows 64 bits.
https://github.com/0vercl0k/CVE-2019-9810
https://github.com/0vercl0k/CVE-2019-9810
GitHub
GitHub - 0vercl0k/CVE-2019-9810: Exploit for CVE-2019-9810 Firefox on Windows 64-bit.
Exploit for CVE-2019-9810 Firefox on Windows 64-bit. - 0vercl0k/CVE-2019-9810
Docker Tutorial Series – Romin Irani’s Blog
https://rominirani.com/docker-tutorial-series-a7e6ff90a023
https://rominirani.com/docker-tutorial-series-a7e6ff90a023
Medium
Docker Tutorial Series
Unless you have intentionally decided to block any news around software in your social feeds, it is likely that you have heard about Docker. I have written a few posts around Docker and how you can…