Resolve domains into IP address:
"cat subdomain.txt | xargs dig | grep A | grep -oE "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b" >> liveip.txt"
"cat subdomain.txt | xargs dig | grep A | grep -oE "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b" >> liveip.txt"
Linux Rootkits:
Part 1 - Introduction and Worflow
https://xcellerator.github.io/posts/linux_rootkits_01
Part 2 - Ftrace and Function Hooking
https://xcellerator.github.io/posts/linux_rootkits_02
Part 3 - A Backdoor to Root
https://xcellerator.github.io/posts/linux_rootkits_03
Part 4 - Backdooring PRNGs by Interfering with Char Dev.
https://xcellerator.github.io/posts/linux_rootkits_04
Part 5 - Hiding Kernel Modules from Userspace
https://xcellerator.github.io/posts/linux_rootkits_05
Part 6 - Hiding Directories
https://xcellerator.github.io/posts/linux_rootkits_06
Part 7 - Hiding Processes
https://xcellerator.github.io/posts/linux_rootkits_07
Part 8 - Hiding Open Ports
https://xcellerator.github.io/posts/linux_rootkits_08
Part 9 - Hiding Logged In Users
https://xcellerator.github.io/posts/linux_rootkits_09
Part 1 - Introduction and Worflow
https://xcellerator.github.io/posts/linux_rootkits_01
Part 2 - Ftrace and Function Hooking
https://xcellerator.github.io/posts/linux_rootkits_02
Part 3 - A Backdoor to Root
https://xcellerator.github.io/posts/linux_rootkits_03
Part 4 - Backdooring PRNGs by Interfering with Char Dev.
https://xcellerator.github.io/posts/linux_rootkits_04
Part 5 - Hiding Kernel Modules from Userspace
https://xcellerator.github.io/posts/linux_rootkits_05
Part 6 - Hiding Directories
https://xcellerator.github.io/posts/linux_rootkits_06
Part 7 - Hiding Processes
https://xcellerator.github.io/posts/linux_rootkits_07
Part 8 - Hiding Open Ports
https://xcellerator.github.io/posts/linux_rootkits_08
Part 9 - Hiding Logged In Users
https://xcellerator.github.io/posts/linux_rootkits_09
Linux Rootkits Part 1: Introduction and Workflow
Linux Rootkits Part 1: Introduction and Workflow :: TheXcellerator
Learning about Linux rootkits is a great way to learn more about how the kernel works. What’s great about it is that, unless you really understand what the kernel is doing, your rootkit is unlikely to work, so it serves as a fantasic verifier.
In the FreeBSD…
In the FreeBSD…
Fortinet FortiWeb OS Command Injection | Rapid7 Blog
https://www.rapid7.com/blog/post/2021/08/17/fortinet-fortiweb-os-command-injection/
https://www.rapid7.com/blog/post/2021/08/17/fortinet-fortiweb-os-command-injection/
Rapid7
Fortinet FortiWeb OS Command Injection | Rapid7 Blog
When using the DHCP module, make sure to edit Responder.conf WPAD's noscript.
"return 'PROXY ProxySrv:3128; PROXY ProxySrv:3141;" -->
"return 'PROXY *Your-IP*:3128; PROXY *Your-IP*:3141;"
Also, Responder should be run this way:
./Responder.py -I eth0 -rPvd
Free credz assured :)
"return 'PROXY ProxySrv:3128; PROXY ProxySrv:3141;" -->
"return 'PROXY *Your-IP*:3128; PROXY *Your-IP*:3141;"
Also, Responder should be run this way:
./Responder.py -I eth0 -rPvd
Free credz assured :)
GitHub - optiv/ScareCrow: ScareCrow - Payload creation framework designed around EDR bypass.
https://github.com/optiv/ScareCrow
https://github.com/optiv/ScareCrow
GitHub
GitHub - optiv/ScareCrow: ScareCrow - Payload creation framework designed around EDR bypass.
ScareCrow - Payload creation framework designed around EDR bypass. - optiv/ScareCrow
magnet:?xt=urn:btih:d0d7bfd41eb5fef91b8b348e1e92267ec8bf9ccf&dn=[underver.se].t216987.torrent&tr=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969&tr=udp%3A%2F%2Fexplodie.org%3A6969&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337&tr=http%3A%2F%2Fretracker.local/announce&tr=http%3A%2F%2Fund3rv3rse.info%2Ffree%2Fannounce
GitHub - devanshbatham/Awesome-Bugbounty-Writeups: A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
https://github.com/devanshbatham/Awesome-Bugbounty-Writeups
https://github.com/devanshbatham/Awesome-Bugbounty-Writeups
GitHub
GitHub - ngalongc/bug-bounty-reference: Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up…
Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature - ngalongc/bug-bounty-reference