Хакинг на примерах. 2 издание.pdf
31.2 MB
Hacking with examples. Vulnerabilities, Hacking, Protection, 2nd Edition
Global "Internet health" map.
"Tracking Internet outages across ISPs, top application providers, public clouds, and edge service networks".
Live 24 hours data.
thousandeyes.com/outages/
Tip by twitter.com/akaclandestine Creator twitter.com/thousandeyes
"Tracking Internet outages across ISPs, top application providers, public clouds, and edge service networks".
Live 24 hours data.
thousandeyes.com/outages/
Tip by twitter.com/akaclandestine Creator twitter.com/thousandeyes
❤3
http://search4faces.com/tt00
Reverse image search in database of more than 98 millions #TikTok avatars.
#oldstuff #osint #socmint
Reverse image search in database of more than 98 millions #TikTok avatars.
#oldstuff #osint #socmint
❤1
http://pastvu.com
Worldmap with old geotagged photos (from 1826 по 2000). More than 1 million 48 thousands public images in service's databases.
#oldstuff #geoint #osint
Worldmap with old geotagged photos (from 1826 по 2000). More than 1 million 48 thousands public images in service's databases.
#oldstuff #geoint #osint
❤2
search4faces.com/ch00
Reverse image search in database of more than 4,5 millions #Clubhouse avatars.
#oldstuff #osint #socmint
Reverse image search in database of more than 4,5 millions #Clubhouse avatars.
#oldstuff #osint #socmint
❤1
http://onionsearchengine.com
Onion Search Engine with different services:
- news;
- pastebin;
- mail;
- maps;
- pastebin;
- cloud drive.
#tor #searchengine #anonimity
Onion Search Engine with different services:
- news;
- pastebin;
- mail;
- maps;
- pastebin;
- cloud drive.
#tor #searchengine #anonimity
❤3
http://github.com/Rog3rSm1th/Profil3r — tool that allows you to find a person's accounts and emails + breached emails.
Run it in your browser without installation (via
@Gitpod
)
https://gitpod.io/#snapshot/8c79922a-7b59-4ce7-811a-58dea0e2885d
#oldstuff #socmint
Run it in your browser without installation (via
@Gitpod
)
https://gitpod.io/#snapshot/8c79922a-7b59-4ce7-811a-58dea0e2885d
#oldstuff #socmint
❤2👍1
Acunetix v24.9.241015145 - 17 Oct 2024
Windows: https://pwn3rzs.co/scanner_web/acunetix/Acunetix-v24.9.241015145-Windows-Pwn3rzs-CyberArsenal.rar
Linux: https://pwn3rzs.co/scanner_web/acunetix/Acunetix-v24.9.241015145-Linux-Pwn3rzs-CyberArsenal.7z
Password: Pwn3rzs
⚠️ Installers come from the known scammer channel, so remember to pay attention and use a safe environment!!!! ⚠️
Changelog:
Too long for a post, refer here:
https://www.acunetix.com/changelogs/acunetix-premium/v24-9-2-16-october-2024/
Windows: https://pwn3rzs.co/scanner_web/acunetix/Acunetix-v24.9.241015145-Windows-Pwn3rzs-CyberArsenal.rar
Linux: https://pwn3rzs.co/scanner_web/acunetix/Acunetix-v24.9.241015145-Linux-Pwn3rzs-CyberArsenal.7z
Password: Pwn3rzs
⚠️ Installers come from the known scammer channel, so remember to pay attention and use a safe environment!!!! ⚠️
Changelog:
Too long for a post, refer here:
https://www.acunetix.com/changelogs/acunetix-premium/v24-9-2-16-october-2024/
Acunetix
v24.9.241015145 - 17 Oct 2024 - Acunetix Premium Changelog | Acunetix
Release build 24.9.241015145 includes a new security check and product improvements.
❤1🔥1
❤4😁1
Forwarded from Telegram
Please note that our moderators had to block the following messages in your channel @citsecurity due to copyright infringement: https://news.1rj.ru/str/c/1232370609/6178
😁8👍1👏1
C.I.T. Security
Еноты на месте?🦝 Вам в мусорку накидали🗑 https://news.1rj.ru/str/+WOFeU7VW2oYyZTI0
На мусорку подпишитесь на всякий случай
👍1
ShadowDumper
It uses 7 advanced techniques to dump LSASS memory.
Capabilities:
It uses 7 advanced techniques to dump LSASS memory.
Capabilities:
• Unhooked Injection (Modified Mimikatz Binary) – Utilizes unhooking to inject a modified Mimikatz binary, bypassing EDR hooks and evading detection.
• Unhooked Injection (Direct Syscalls with MDWD) – Implements direct syscalls for stealthy injection using MDWD, reducing the footprint left behind.
• Simple MiniDumpWriteDump API – Executes the straightforward MiniDumpWriteDump API method for standard LSASS memory extraction.
• MINIDUMP_CALLBACK_INFORMATION Callbacks – Uses callback functions for custom handling, offering greater control over the dumping process.
• Process Forking Technique – Forks the LSASS process, creating a memory clone and avoiding direct access to the target process.
• Direct Syscalls with MiniDumpWriteDump – Combines direct syscalls with MiniDumpWriteDump, enhancing stealth by avoiding typical API hooks.
• Native Dump with Direct Syscalls (Offline Parsing) – Leverages direct syscalls to create a native dump with essential streams for offline parsing, perfect for low-noise operations.
👍3
Malware and cryptography 32: encrypt payload via FEAL-8 algorithm. Simple C example.
Linux malware development 2: find process ID by name. Simple C example.
Malware development trick 43: Shuffle malicious payload. Simple C example.
Malware and cryptography 33: encrypt payload via Lucifer algorithm. Simple C example.
Malware and cryptography 34: encrypt payload via DFC algorithm. Simple C example.
Linux malware development 2: find process ID by name. Simple C example.
Malware development trick 43: Shuffle malicious payload. Simple C example.
Malware and cryptography 33: encrypt payload via Lucifer algorithm. Simple C example.
Malware and cryptography 34: encrypt payload via DFC algorithm. Simple C example.
This media is not supported in your browser
VIEW IN TELEGRAM
KrakenMask
Sleep obfuscation
Update 2.1 :
New advanced evasion method on CONTEXT.RIP with gadgets never used before.
Update 2.0 :
Sleep mask using APC with gadget-based evasion to bypass current detection methods.
Sleep obfuscation
Update 2.1 :
New advanced evasion method on CONTEXT.RIP with gadgets never used before.
Update 2.0 :
Sleep mask using APC with gadget-based evasion to bypass current detection methods.
#ransomware_everywhere
Extract and execute a PE embedded within a PNG file using an LNK file.
https://github.com/Maldev-Academy/ExecutePeFromPngViaLNK
Extract and execute a PE embedded within a PNG file using an LNK file.
https://github.com/Maldev-Academy/ExecutePeFromPngViaLNK
GitHub
GitHub - Maldev-Academy/ExecutePeFromPngViaLNK: Extract and execute a PE embedded within a PNG file using an LNK file.
Extract and execute a PE embedded within a PNG file using an LNK file. - Maldev-Academy/ExecutePeFromPngViaLNK