Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ Email Tracking:
### ๐ About Zehef
Zehef specializes in:
- Locating public data associated with a specific email address.
- Providing insights into email breaches, pastes, and social media accounts.
---
### ๐ Key Features
1. Breached Data Check:
- Identify if the email has appeared in any public data breaches using sources like Pastebin or others.
2. HudsonRock Integration:
- Leverage HudsonRock to analyze leaks and identify potential compromises.
3. Social Media Account Discovery:
- Check for linked accounts across platforms such as:
- Instagram
- Spotify
- Deezer
- Adobe
- ๐ (formerly Twitter), etc.
4. Email Combination Generation:
- Create possible variations of the target email for further testing or OSINT purposes.
---
### ๐ฆ Installation
#### Prerequisites
- Python: Version 3.10 or later.
- Git: Installed and configured.
#### Steps:
1. Clone the Zehef repository:
2. Install the dependencies:
---
### ๐ฒ Usage
Run the tool with the following syntax:
#### Example:
#### Available Options:
-
-
---
### ๐ก Notes
Zehef is an advanced tool for ethical OSINT practices and should only be used with proper authorization. Misuse could violate laws or terms of service on various platforms.
๐ GitHub Repository: [Zehef on GitHub](https://github.com/N0rz3/Zehef)
### ๐ About Zehef
Zehef specializes in:
- Locating public data associated with a specific email address.
- Providing insights into email breaches, pastes, and social media accounts.
---
### ๐ Key Features
1. Breached Data Check:
- Identify if the email has appeared in any public data breaches using sources like Pastebin or others.
2. HudsonRock Integration:
- Leverage HudsonRock to analyze leaks and identify potential compromises.
3. Social Media Account Discovery:
- Check for linked accounts across platforms such as:
- Spotify
- Deezer
- Adobe
- ๐ (formerly Twitter), etc.
4. Email Combination Generation:
- Create possible variations of the target email for further testing or OSINT purposes.
---
### ๐ฆ Installation
#### Prerequisites
- Python: Version 3.10 or later.
- Git: Installed and configured.
#### Steps:
1. Clone the Zehef repository:
git clone https://github.com/N0rz3/Zehef.git
cd Zehef
2. Install the dependencies:
pip3 install -r requirements.txt
---
### ๐ฒ Usage
Run the tool with the following syntax:
python3 zehef.py [email]
#### Example:
python3 zehef.py target@example.com
#### Available Options:
-
email: The email address for which you want to retrieve information.-
-h, --help: Displays help information.---
### ๐ก Notes
Zehef is an advanced tool for ethical OSINT practices and should only be used with proper authorization. Misuse could violate laws or terms of service on various platforms.
๐ GitHub Repository: [Zehef on GitHub](https://github.com/N0rz3/Zehef)
GitHub
GitHub - N0rz3/Zehef: Zehef is an osint tool to track emails
Zehef is an osint tool to track emails. Contribute to N0rz3/Zehef development by creating an account on GitHub.
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ To "run a script" on a quantum computer, you typically use a quantum programming language like Qiskit (for IBM Quantum), Cirq (for Google's quantum devices), or others like Braket (Amazon)
Quantum Script Using Qiskit
---
### What It Does:
1. Hadamard Gate (H): Places the qubit in a superposition, meaning it's in a mix of
2. Measurement: Collapses the qubit to either
3. Simulation: Runs the quantum program multiple times (e.g., 1024 shots) on a classical simulator to emulate quantum results.
---
### Output Example:
After running, you might see:
---
### Running on a Real Quantum Computer:
If you have access to IBM Quantum or a similar quantum platform:
1. Replace the simulator with an actual quantum backend:
Quantum computing is still in its infancy, and scripts generally focus on demonstrating concepts or solving specific problems (e.g., optimization or quantum chemistry simulations). Let me know if you'd like to explore further!
Quantum Script Using Qiskit
# Import necessary libraries
from qiskit import QuantumCircuit, Aer, execute
# Step 1: Create a quantum circuit with one qubit and one classical bit
qc = QuantumCircuit(1, 1)
# Step 2: Apply a Hadamard gate to put the qubit in superposition
qc.h(0)
# Step 3: Measure the qubit
qc.measure(0, 0)
# Step 4: Simulate the quantum circuit
simulator = Aer.get_backend('qasm_simulator') # Classical simulation of a quantum computer
result = execute(qc, simulator, shots=1024).result()
# Step 5: Retrieve and display results
counts = result.get_counts()
print("Measurement Results:", counts)
# Optional: Visualize the circuit
print(qc)
---
### What It Does:
1. Hadamard Gate (H): Places the qubit in a superposition, meaning it's in a mix of
|0โฉ and |1โฉ.2. Measurement: Collapses the qubit to either
|0โฉ or |1โฉ probabilistically upon measurement.3. Simulation: Runs the quantum program multiple times (e.g., 1024 shots) on a classical simulator to emulate quantum results.
---
### Output Example:
After running, you might see:
Measurement Results: {'0': 511, '1': 513}
โโโโโ โ โโโ
q_0: โค H โโโโโคMโ
โโโโโ โ โโฅโ
c_0: โโโโโโโโโจโ---
### Running on a Real Quantum Computer:
If you have access to IBM Quantum or a similar quantum platform:
1. Replace the simulator with an actual quantum backend:
from qiskit import IBMQ
IBMQ.load_account()
provider = IBMQ.get_provider(hub='ibm-q')
backend = provider.get_backend('ibmq_qasm_simulator') # Use an actual quantum device here
result = execute(qc, backend, shots=1024).result()
Quantum computing is still in its infancy, and scripts generally focus on demonstrating concepts or solving specific problems (e.g., optimization or quantum chemistry simulations). Let me know if you'd like to explore further!
๐ฆ Reverse engineering:
๐ฅ๏ธ Static Analysis Tools
1. IDA Pro
- Industry-standard disassembler and debugger for analyzing binaries.
- Includes a powerful scripting engine.
- Website: [Hex-Rays](https://hex-rays.com/)
2. Ghidra
- Open-source reverse engineering suite developed by the NSA.
- Features include decompilation and support for various architectures.
- GitHub: [Ghidra](https://github.com/NationalSecurityAgency/ghidra)
3. Radare2
- Advanced open-source framework for analyzing binaries, debugging, and patching.
- Command-line focused but has GUI support via Cutter.
- GitHub: [Radare2](https://github.com/radareorg/radare2)
4. Binary Ninja
- Lightweight reverse engineering platform with an emphasis on automation.
- Features include powerful APIs for custom analysis.
- Website: [Binary Ninja](https://binary.ninja/)
5. Capstone
- A lightweight disassembly framework supporting multiple architectures.
- Often used as a backend for other tools.
- GitHub: [Capstone](https://github.com/capstone-engine/capstone)
---
### ๐ Dynamic Analysis Tools
1. OllyDbg
- Classic debugger for Windows binaries.
- Focused on malware and exploit analysis.
2. WinDbg
- A powerful Windows debugger.
- Commonly used for debugging Windows kernel and drivers.
3. x64dbg
- Open-source debugger for Windows applications.
- Provides a user-friendly GUI and scripting capabilities.
- GitHub: [x64dbg](https://github.com/x64dbg/x64dbg)
4. Frida
- Dynamic instrumentation toolkit.
- Ideal for analyzing mobile apps and binaries during runtime.
- GitHub: [Frida](https://github.com/frida/frida)
5. Qiling Framework
- Advanced binary emulation framework for testing and debugging.
- Supports multiple architectures.
- GitHub: [Qiling Framework](https://github.com/qilingframework/qiling)
---
### ๐ฑ Mobile App Reverse Engineering Tools
1. APKTool
- Decompiles Android APK files to view the source code and resources.
- Ideal for analyzing Android malware or app vulnerabilities.
- GitHub: [APKTool](https://github.com/iBotPeaches/Apktool)
2. Jadx
- Decompiler for Android DEX and APK files.
- Converts binary code into readable Java code.
- GitHub: [Jadx](https://github.com/skylot/jadx)
3. Hopper Disassembler
- User-friendly disassembler and debugger for macOS and iOS binaries.
- Website: [Hopper](https://www.hopperapp.com/)
---
### โ๏ธ Firmware Reverse Engineering Tools
1. Binwalk
- Tool for extracting and analyzing firmware images.
- Frequently used in IoT and embedded system analysis.
- GitHub: [Binwalk](https://github.com/ReFirmLabs/binwalk)
2. GHIDRA Firmware Analyzer
- Part of Ghidra; supports firmware disassembly and analysis.
3. Firmadyne
- Emulation and analysis of Linux-based firmware.
- GitHub: [Firmadyne](https://github.com/firmadyne/firmadyne)
---
### ๐ Encryption and Obfuscation Tools
1. Uncompyle6
- Decompiler for Python bytecode back into readable Python source code.
- GitHub: [Uncompyle6](https://github.com/rocky/python-uncompyle6)
2. Procyon
- Java decompiler that supports modern Java features.
- GitHub: [Procyon](https://github.com/mstrobel/procyon)
3. Snowman Decompiler
- Lightweight decompiler for C/C++ binaries.
- GitHub: [Snowman](https://github.com/yegord/snowman)
---
### ๐ก Other Useful Tools
1. YARA
- Helps identify and classify malware through pattern matching.
- GitHub: [YARA](https://github.com/VirusTotal/yara)
2. RETool
- Web-based reverse engineering toolkit.
- Ideal for quick analysis without heavy installations.
- Website: [RETool](https://reverseengineeringtool.com/)
3. DiE (Detect It Easy)
- Identifies obfuscation, packers, and encryption in binaries.
- GitHub: [Detect It Easy](https://github.com/horsicq/Detect-It-Easy)
๐ฅ๏ธ Static Analysis Tools
1. IDA Pro
- Industry-standard disassembler and debugger for analyzing binaries.
- Includes a powerful scripting engine.
- Website: [Hex-Rays](https://hex-rays.com/)
2. Ghidra
- Open-source reverse engineering suite developed by the NSA.
- Features include decompilation and support for various architectures.
- GitHub: [Ghidra](https://github.com/NationalSecurityAgency/ghidra)
3. Radare2
- Advanced open-source framework for analyzing binaries, debugging, and patching.
- Command-line focused but has GUI support via Cutter.
- GitHub: [Radare2](https://github.com/radareorg/radare2)
4. Binary Ninja
- Lightweight reverse engineering platform with an emphasis on automation.
- Features include powerful APIs for custom analysis.
- Website: [Binary Ninja](https://binary.ninja/)
5. Capstone
- A lightweight disassembly framework supporting multiple architectures.
- Often used as a backend for other tools.
- GitHub: [Capstone](https://github.com/capstone-engine/capstone)
---
### ๐ Dynamic Analysis Tools
1. OllyDbg
- Classic debugger for Windows binaries.
- Focused on malware and exploit analysis.
2. WinDbg
- A powerful Windows debugger.
- Commonly used for debugging Windows kernel and drivers.
3. x64dbg
- Open-source debugger for Windows applications.
- Provides a user-friendly GUI and scripting capabilities.
- GitHub: [x64dbg](https://github.com/x64dbg/x64dbg)
4. Frida
- Dynamic instrumentation toolkit.
- Ideal for analyzing mobile apps and binaries during runtime.
- GitHub: [Frida](https://github.com/frida/frida)
5. Qiling Framework
- Advanced binary emulation framework for testing and debugging.
- Supports multiple architectures.
- GitHub: [Qiling Framework](https://github.com/qilingframework/qiling)
---
### ๐ฑ Mobile App Reverse Engineering Tools
1. APKTool
- Decompiles Android APK files to view the source code and resources.
- Ideal for analyzing Android malware or app vulnerabilities.
- GitHub: [APKTool](https://github.com/iBotPeaches/Apktool)
2. Jadx
- Decompiler for Android DEX and APK files.
- Converts binary code into readable Java code.
- GitHub: [Jadx](https://github.com/skylot/jadx)
3. Hopper Disassembler
- User-friendly disassembler and debugger for macOS and iOS binaries.
- Website: [Hopper](https://www.hopperapp.com/)
---
### โ๏ธ Firmware Reverse Engineering Tools
1. Binwalk
- Tool for extracting and analyzing firmware images.
- Frequently used in IoT and embedded system analysis.
- GitHub: [Binwalk](https://github.com/ReFirmLabs/binwalk)
2. GHIDRA Firmware Analyzer
- Part of Ghidra; supports firmware disassembly and analysis.
3. Firmadyne
- Emulation and analysis of Linux-based firmware.
- GitHub: [Firmadyne](https://github.com/firmadyne/firmadyne)
---
### ๐ Encryption and Obfuscation Tools
1. Uncompyle6
- Decompiler for Python bytecode back into readable Python source code.
- GitHub: [Uncompyle6](https://github.com/rocky/python-uncompyle6)
2. Procyon
- Java decompiler that supports modern Java features.
- GitHub: [Procyon](https://github.com/mstrobel/procyon)
3. Snowman Decompiler
- Lightweight decompiler for C/C++ binaries.
- GitHub: [Snowman](https://github.com/yegord/snowman)
---
### ๐ก Other Useful Tools
1. YARA
- Helps identify and classify malware through pattern matching.
- GitHub: [YARA](https://github.com/VirusTotal/yara)
2. RETool
- Web-based reverse engineering toolkit.
- Ideal for quick analysis without heavy installations.
- Website: [RETool](https://reverseengineeringtool.com/)
3. DiE (Detect It Easy)
- Identifies obfuscation, packers, and encryption in binaries.
- GitHub: [Detect It Easy](https://github.com/horsicq/Detect-It-Easy)
Hex-Rays
Hex-Rays: State-of-the-Art Binary Code Analysis Tools
Professional binary analysis with IDA Pro disassembler and decompiler. Tools for reverse engineering, malware analysis, and vulnerability research.
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ New Working list of Google Dorks :
### Files Containing Passwords
1.
2.
3.
4.
### Various Online Devices
5.
### Vulnerable Servers
6.
7.
8.
9.
### Files Containing Juicy Info
10.
11.
12.
13.
### Files Containing Usernames
14.
15.
### Files Containing Passwords
1.
site:github.com "BEGIN OPENSSH PRIVATE KEY" 2.
ext:nix "BEGIN OPENSSH PRIVATE KEY" 3.
intext:"aws_access_key_id" | intext:"aws_secret_access_key" filetype:json | filetype:yaml 4.
intitle:index of /etc/ssh ### Various Online Devices
5.
inurl:home.htm intitle:1766 ### Vulnerable Servers
6.
intitle:"SSL Network Extender Login" -checkpoint.com 7.
intext:"siemens" & inurl:"/portal/portal.mwsl" 8.
Google Dork Submisson For GlobalProtect Portal 9.
inurl:"cgi-bin/koha" ### Files Containing Juicy Info
10.
intext:"proftpd.conf" "index of" 11.
site:.edu filetype:xls "root" database 12.
intext:"dhcpd.conf" "index of" 13.
site:uat.* * inurl:login ### Files Containing Usernames
14.
"START test_database" ext:log 15.
"Header for logs at time" ext:logForwarded from Exploiting Crew (Pr1vAt3)
Linkedin
Naor Truzman on LinkedIn: ืคืจืืืืงืืืื ืืคืืจืืื ืืฉืืืื ืSOC
ืืื ืืื ืฉืื ืืจืง ืืชืืืืื ืืืืื ืก ืืขืืื ืืกืืืืจ ืืื ืชื ืืืืืืื ืืกืื ืืฉืจ ืืกืื ืื ืืช ืื ืืคืจืืืืงืืืื ืืืฉืืืื ืSOC ืืชืืืชื ืฆืจืื ืืืขืช ืืืืืืจ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ Top Ai Image Generators:
General AI Art Tools
1. DALLยทE
7 [https://openai.com/dall-e](https://openai.com/dall-e)
2. MidJourney
[https://www.midjourney.com](https://www.midjourney.com)
3. Stable Diffusion (DreamStudio)
[https://dreamstudio.ai](https://dreamstudio.ai)
4. DeepAI Image Generator
[https://deepai.org/machine-learning-model/text2img](https://deepai.org/machine-learning-model/text2img)
5. Runway ML
[https://runwayml.com](https://runwayml.com)
### Free and Easy-to-Use Generators
6. Craiyon (formerly DALLยทE Mini)
[https://craiyon.com](https://craiyon.com)
7. Artbreeder
[https://www.artbreeder.com](https://www.artbreeder.com)
8. Fotor AI Art Generator
[https://www.fotor.com/features/ai-image-generator](https://www.fotor.com/features/ai-image-generator)
9. Picsart AI Generator
[https://picsart.com/ai-image-generator](https://picsart.com/ai-image-generator)
10. NightCafe Studio
[https://creator.nightcafe.studio](https://creator.nightcafe.studio)
### Specialized AI Tools
11. Avatarify AI (For Portraits)
[https://www.avatarify.ai](https://www.avatarify.ai)
12. Deep Dream Generator (Surreal Images)
[https://deepdreamgenerator.com](https://deepdreamgenerator.com)
13. Deep Nostalgia (Photo Animation)
[https://www.myheritage.com/deep-nostalgia](https://www.myheritage.com/deep-nostalgia)
14. ArtSmart.ai
[https://artsmart.ai](https://artsmart.ai)
15. RunDiffusion (Customizable)
[https://www.rundiffusion.com](https://www.rundiffusion.com)
General AI Art Tools
1. DALLยทE
7 [https://openai.com/dall-e](https://openai.com/dall-e)
2. MidJourney
[https://www.midjourney.com](https://www.midjourney.com)
3. Stable Diffusion (DreamStudio)
[https://dreamstudio.ai](https://dreamstudio.ai)
4. DeepAI Image Generator
[https://deepai.org/machine-learning-model/text2img](https://deepai.org/machine-learning-model/text2img)
5. Runway ML
[https://runwayml.com](https://runwayml.com)
### Free and Easy-to-Use Generators
6. Craiyon (formerly DALLยทE Mini)
[https://craiyon.com](https://craiyon.com)
7. Artbreeder
[https://www.artbreeder.com](https://www.artbreeder.com)
8. Fotor AI Art Generator
[https://www.fotor.com/features/ai-image-generator](https://www.fotor.com/features/ai-image-generator)
9. Picsart AI Generator
[https://picsart.com/ai-image-generator](https://picsart.com/ai-image-generator)
10. NightCafe Studio
[https://creator.nightcafe.studio](https://creator.nightcafe.studio)
### Specialized AI Tools
11. Avatarify AI (For Portraits)
[https://www.avatarify.ai](https://www.avatarify.ai)
12. Deep Dream Generator (Surreal Images)
[https://deepdreamgenerator.com](https://deepdreamgenerator.com)
13. Deep Nostalgia (Photo Animation)
[https://www.myheritage.com/deep-nostalgia](https://www.myheritage.com/deep-nostalgia)
14. ArtSmart.ai
[https://artsmart.ai](https://artsmart.ai)
15. RunDiffusion (Customizable)
[https://www.rundiffusion.com](https://www.rundiffusion.com)
Openai
DALLยทE 3
DALLยทE 3 understands significantly more nuance and detail than our previous systems, allowing you to easily translate your ideas into exceptionally accurate images.
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆExploitation of the Microsoft Exchange Vulnerability:
During the IR investigation, the Nocturnus Team was able to identify the initial compromise vector, in which the attackers exploited the recently discovered vulnerabilities in Microsoft Exchange server, which allowed them to perform remote code execution by exploiting the following CVEs: CVE-2021-27065 and CVE-2021-26858.
The attackers used this vulnerability to install and execute the China Chopper webshell via the following commands:
During the IR investigation, the Nocturnus Team was able to identify the initial compromise vector, in which the attackers exploited the recently discovered vulnerabilities in Microsoft Exchange server, which allowed them to perform remote code execution by exploiting the following CVEs: CVE-2021-27065 and CVE-2021-26858.
The attackers used this vulnerability to install and execute the China Chopper webshell via the following commands:
Forwarded from Exploiting Crew (Pr1vAt3)
Once the attackers gained access to the network, they deleted the .aspx webshell file to cover their tracks:
cmd.exe /c del "C:\Program Files\Microsoft\Exchange Server\V15\\frontend\httpproxy\owa\auth\<file_name>.aspx"
cmd.exe /c del "C:\Program Files\Microsoft\Exchange Server\V15\\frontend\httpproxy\owa\auth\<file_name>.aspx"