http://pastvu.com
Worldmap with old geotagged photos (from 1826 по 2000). More than 1 million 48 thousands public images in service's databases.
#oldstuff #geoint #osint
Worldmap with old geotagged photos (from 1826 по 2000). More than 1 million 48 thousands public images in service's databases.
#oldstuff #geoint #osint
❤2
search4faces.com/ch00
Reverse image search in database of more than 4,5 millions #Clubhouse avatars.
#oldstuff #osint #socmint
Reverse image search in database of more than 4,5 millions #Clubhouse avatars.
#oldstuff #osint #socmint
❤1
http://onionsearchengine.com
Onion Search Engine with different services:
- news;
- pastebin;
- mail;
- maps;
- pastebin;
- cloud drive.
#tor #searchengine #anonimity
Onion Search Engine with different services:
- news;
- pastebin;
- mail;
- maps;
- pastebin;
- cloud drive.
#tor #searchengine #anonimity
❤3
http://github.com/Rog3rSm1th/Profil3r — tool that allows you to find a person's accounts and emails + breached emails.
Run it in your browser without installation (via
@Gitpod
)
https://gitpod.io/#snapshot/8c79922a-7b59-4ce7-811a-58dea0e2885d
#oldstuff #socmint
Run it in your browser without installation (via
@Gitpod
)
https://gitpod.io/#snapshot/8c79922a-7b59-4ce7-811a-58dea0e2885d
#oldstuff #socmint
❤2👍1
Acunetix v24.9.241015145 - 17 Oct 2024
Windows: https://pwn3rzs.co/scanner_web/acunetix/Acunetix-v24.9.241015145-Windows-Pwn3rzs-CyberArsenal.rar
Linux: https://pwn3rzs.co/scanner_web/acunetix/Acunetix-v24.9.241015145-Linux-Pwn3rzs-CyberArsenal.7z
Password: Pwn3rzs
⚠️ Installers come from the known scammer channel, so remember to pay attention and use a safe environment!!!! ⚠️
Changelog:
Too long for a post, refer here:
https://www.acunetix.com/changelogs/acunetix-premium/v24-9-2-16-october-2024/
Windows: https://pwn3rzs.co/scanner_web/acunetix/Acunetix-v24.9.241015145-Windows-Pwn3rzs-CyberArsenal.rar
Linux: https://pwn3rzs.co/scanner_web/acunetix/Acunetix-v24.9.241015145-Linux-Pwn3rzs-CyberArsenal.7z
Password: Pwn3rzs
⚠️ Installers come from the known scammer channel, so remember to pay attention and use a safe environment!!!! ⚠️
Changelog:
Too long for a post, refer here:
https://www.acunetix.com/changelogs/acunetix-premium/v24-9-2-16-october-2024/
Acunetix
v24.9.241015145 - 17 Oct 2024 - Acunetix Premium Changelog | Acunetix
Release build 24.9.241015145 includes a new security check and product improvements.
❤1🔥1
❤4😁1
Forwarded from Telegram
Please note that our moderators had to block the following messages in your channel @citsecurity due to copyright infringement: https://news.1rj.ru/str/c/1232370609/6178
😁8👍1👏1
C.I.T. Security
Еноты на месте?🦝 Вам в мусорку накидали🗑 https://news.1rj.ru/str/+WOFeU7VW2oYyZTI0
На мусорку подпишитесь на всякий случай
👍1
ShadowDumper
It uses 7 advanced techniques to dump LSASS memory.
Capabilities:
It uses 7 advanced techniques to dump LSASS memory.
Capabilities:
• Unhooked Injection (Modified Mimikatz Binary) – Utilizes unhooking to inject a modified Mimikatz binary, bypassing EDR hooks and evading detection.
• Unhooked Injection (Direct Syscalls with MDWD) – Implements direct syscalls for stealthy injection using MDWD, reducing the footprint left behind.
• Simple MiniDumpWriteDump API – Executes the straightforward MiniDumpWriteDump API method for standard LSASS memory extraction.
• MINIDUMP_CALLBACK_INFORMATION Callbacks – Uses callback functions for custom handling, offering greater control over the dumping process.
• Process Forking Technique – Forks the LSASS process, creating a memory clone and avoiding direct access to the target process.
• Direct Syscalls with MiniDumpWriteDump – Combines direct syscalls with MiniDumpWriteDump, enhancing stealth by avoiding typical API hooks.
• Native Dump with Direct Syscalls (Offline Parsing) – Leverages direct syscalls to create a native dump with essential streams for offline parsing, perfect for low-noise operations.
👍3
Malware and cryptography 32: encrypt payload via FEAL-8 algorithm. Simple C example.
Linux malware development 2: find process ID by name. Simple C example.
Malware development trick 43: Shuffle malicious payload. Simple C example.
Malware and cryptography 33: encrypt payload via Lucifer algorithm. Simple C example.
Malware and cryptography 34: encrypt payload via DFC algorithm. Simple C example.
Linux malware development 2: find process ID by name. Simple C example.
Malware development trick 43: Shuffle malicious payload. Simple C example.
Malware and cryptography 33: encrypt payload via Lucifer algorithm. Simple C example.
Malware and cryptography 34: encrypt payload via DFC algorithm. Simple C example.
This media is not supported in your browser
VIEW IN TELEGRAM
KrakenMask
Sleep obfuscation
Update 2.1 :
New advanced evasion method on CONTEXT.RIP with gadgets never used before.
Update 2.0 :
Sleep mask using APC with gadget-based evasion to bypass current detection methods.
Sleep obfuscation
Update 2.1 :
New advanced evasion method on CONTEXT.RIP with gadgets never used before.
Update 2.0 :
Sleep mask using APC with gadget-based evasion to bypass current detection methods.
#ransomware_everywhere
Extract and execute a PE embedded within a PNG file using an LNK file.
https://github.com/Maldev-Academy/ExecutePeFromPngViaLNK
Extract and execute a PE embedded within a PNG file using an LNK file.
https://github.com/Maldev-Academy/ExecutePeFromPngViaLNK
GitHub
GitHub - Maldev-Academy/ExecutePeFromPngViaLNK: Extract and execute a PE embedded within a PNG file using an LNK file.
Extract and execute a PE embedded within a PNG file using an LNK file. - Maldev-Academy/ExecutePeFromPngViaLNK
This media is not supported in your browser
VIEW IN TELEGRAM
This #shell is the ultimate WinRM shell for #hacking/#pentesting.
https://github.com/Hackplayers/evil-winrm/tree/ai
@freedomf0x
https://github.com/Hackplayers/evil-winrm/tree/ai
@freedomf0x