DDOS Attack Tools:
➕ SlowLoris:
😸 GitHub
➕ Flood DDoS Weapon:
😸 GitHub
➕ UFOnet:
😸 GitHub
➕ GoldenEye:
😸 GitHub
#Dos #DDos
➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
#Dos #DDos
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
Post exploitation tools:
➕ Vegile — Ghost In The Shell:
😸 GitHub
➕ Chrome Keylogger:
😸 GitHub
➕ Forensic tools
➕ Autopsy:
😸 GitHub
➕ Wireshark:
🌐 Site
➕ Bulk extractor:
😸 GitHub
➕ Disk Clone and ISO Image Aquire:
🌐 Site
➕ Toolsley:
🌐 SIte
#RootKit #Keylogger #Exploit #Tools
➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
#RootKit #Keylogger #Exploit #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
Practice shell
If you support the channels, there are many shell and tools to share with you
Enjoy... ⭐️
🔗 Link
#Shell
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
If you support the channels, there are many shell and tools to share with you
Enjoy... ⭐️
🔗 Link
#Shell
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
🔥2
CVE-2021-4034
One day for the polkit privilege escalation exploit
Just execute
GitHub
#CVE #POC
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
One day for the polkit privilege escalation exploit
Just execute
make, ./cve-2021-4034 and enjoy your root shell.GitHub
#CVE #POC
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
viewdns.com API with Reverse IP Lookup
First, register at https://viewdns.info/api/#register and confirm your account from the link in your mailbox. After performing these operations, your API key will be sent to your mailbox. Moreover By logging into https://viewdns.info/api/# you can see both your API key and remaining requests.
Install libraries used with
If any of these 3 items is absent, the vehicle will not start.
1. By typing it into the 'key.txt' found inside the project files
2. using the -k/--key argument (for first use)
3. If 'key.txt' is empty and there is no -k/--key, the first time the tool starts, it will ask you for your API key from the console and save it.
GitHub
#Python #Api #LookUp
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
First, register at https://viewdns.info/api/#register and confirm your account from the link in your mailbox. After performing these operations, your API key will be sent to your mailbox. Moreover By logging into https://viewdns.info/api/# you can see both your API key and remaining requests.
Install libraries used with
pip install -r requirements.txt
API key save pathsIf any of these 3 items is absent, the vehicle will not start.
1. By typing it into the 'key.txt' found inside the project files
2. using the -k/--key argument (for first use)
3. If 'key.txt' is empty and there is no -k/--key, the first time the tool starts, it will ask you for your API key from the console and save it.
GitHub
#Python #Api #LookUp
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
SugarCRM 12.x Remote Code Execution / Shell Upload Exploit
Category: remote exploits
Platform: php
Risk: [Security Risk Critical]
Denoscription:
This Metasploit module exploits CVE-2023-22952, a remote code execution vulnerability in SugarCRM 11.0 Enterprise, Professional, Sell, Serve, and Ultimate versions prior to 11.0.5 and SugarCRM 12.0 Enterprise, Sell, and Serve versions prior to 12.0.2.
CVE: 2023-22952
Download
#CVE #Exploit #Rc #Shell
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Category: remote exploits
Platform: php
Risk: [Security Risk Critical]
Denoscription:
This Metasploit module exploits CVE-2023-22952, a remote code execution vulnerability in SugarCRM 11.0 Enterprise, Professional, Sell, Serve, and Ultimate versions prior to 11.0.5 and SugarCRM 12.0 Enterprise, Sell, and Serve versions prior to 12.0.2.
CVE: 2023-22952
Download
#CVE #Exploit #Rc #Shell
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3