Skip to main content

Posts

Showing posts from 2017

expert metasploit penetration testing course : denial of service auxiliary modules

expert metasploit penetration testing course : denial of service auxiliary modules  

expert metasploit penetration testing course : working with admin auxiliary modules

 working with admin auxiliary modules expert metasploit penetration testing course

Expert Metasploit Penetration Testing Tutorial: working with auxiliary modules empt 30

 working with auxiliary modules  expert metasploit penetration testing course 30 

Expert Metasploit Penetration Testing Tutorial: Railgun

Railgun 

Expert Metasploit Penetration Testing Tutorial: pivoting

  pivoting expert metasploit penetration testing course  episode 28  

Expert Metasploit Penetration Testing Tutorial:meterpreter networking commands

expert metasploit penetration testing course  episode 27 "meterpreter networking commands "

routersploit: Router Exploitation Framework

  RouterSploit  Router Exploitation Framework github download source Installation Requirements gnureadline (OSX only) requests paramiko beautifulsoup4 pysnmp Installation on Kali git clone https://github.com/reverse-shell/routersploit cd routersploit ./rsf.py Installation on Ubuntu 16.04 sudo apt-get install python-dev python-pip libncurses5-dev git git clone https://github.com/reverse-shell/routersploit cd routersploit pip install -r requirements.txt ./rsf.py Installation on OSX git clone https://github.com/reverse-shell/routersploit cd routersploit sudo easy_install pip sudo pip install -r requirements.txt ./rsf.py Running on Docker git clone https://github.com/reverse-shell/routersploit cd routersploit docker build -t routersploit:latest -f Dockerfile . ./run_docker.sh Update Update RouterSploit Framework often. The project is under heavy development and new modules are shipped almost every day. cd routersploit git pull Usage ...

minergate local crash exploit

minergate local crash exploit Published Credit Risk 2017.04.25 R3d-D3v!L Low CWE CVE Local Remote N/A N/A Yes No    -=-=-=-=-=-=-=-{In The Name Of Allah The Mercifull}-=-=-=-=-=-=-=- [~] Tybe:local crash exploit [~] Vendor: https://minergate.com/downloads/gui [+] Software:minergate [+] infection: crash exploit [~] Version : [~] author: R3d-D3v!L [+] TEAM: ABH [?] contact: X[at]hotmail.co.jp [-] [?] Date: 25.4pr.2ol7 [?] T!ME: 04:54 am GMT [?] Home: abhsec.blogspot.com [^] [?] ===================================================================================== # minergate local crash exploit ===================================================================================== [!] Exploit Already Tested ... on kali linux [^] Error console:- crash ...

OnionShare: Securely and anonymously share file

OnionShare lets you securely and anonymously share files of any size. It works by starting a web server, making it accessible as a Tor onion service, and generating an unguessable URL to access and download the files. It doesn’t require setting up a server on the internet somewhere or using a third party file-sharing service. You host the file on your own computer and use a Tor onion service to make it temporarily accessible over the internet. The other user just needs to use Tor Browser to download the file from you. Features: A user-friendly drag-and-drop graphical user interface that works in Windows, Mac OS X, and Linux Ability to share multiple files and folders at once Support for multiple people downloading files at once Automatically copies the unguessable URL to your clipboard Shows you the progress of file transfers When file is done transferring, automatically closes OnionShare to reduce the attack surface Localized into several languages, and su...

setting up persistent connection using meterpreter

setting up persistent connection using meterpreter expert metasploit penetration testing course episode 26 for all course please follow this link expert metasploit penetration testing course

FUZZBUNCH DEMO : leaked CIA tool

Just to show how powerful this tool is

Best Vulnerability Scanners Tools

Best Vulnerability Scanners Tools    The scanners which assess the vulnerability of a network or a computer to security attacks are known as Vulnerability Scanners. The tools might function differently, however all of them aim to provide an analysis on how vulnerable the system or a network is. Here is a list of the best ones:   Nessus Nessus is the world’s most popular vulnerable scanner topping the list in the years 2000, 2003 and in the year 2006 survey on security tools. It’s a free to use vulnerability scanner for personal use in the non enterprise environment. OpenVAS This scanner is tipped by many to be the most advanced vulnerability scanner in the world and is a powerful and comprehensive tool for scanning as well as providing solutions for vulnerability management. It is free software and is maintained daily. Nipper It is a parser for network infrastructure and its full form is Network Infrastructure Parser. This open sour...

shadow Brokers leaked files

Exploits EARLYSHOVEL RedHat 7.0 - 7.1 Sendmail 8.11.x exploit EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86. ECHOWRECKER remote Samba 3.0.x Linux exploit. EASYBEE appears to be an MDaemon email server vulnerability EASYPI is an IBM Lotus Notes exploit that gets detected as Stuxnet EWOKFRENZY is an exploit for IBM Lotus Domino 6.5.4 & 7.0.2 EXPLODINGCAN is an IIS 6.0 exploit that creates a remote backdoor ETERNALROMANCE is a SMB1 exploit over TCP port 445 which targets XP, 2003, Vista, 7, Windows 8, 2008, 2008 R2, and gives SYSTEM privileges (MS17-010) EDUCATEDSCHOLAR is a SMB exploit (MS09-050) EMERALDTHREAD is a SMB exploit for Windows XP and Server 2003 (MS10-061) EMPHASISMINE is a remote IMAP exploit for IBM Lotus Domino 6.6.4 to 8.5.2 ENGLISHMANSDENTIST sets Outlook Exchange WebAccess rules to trigger executable code on the client's side to send an email to other...

New Attack Called “XSSJacking” Discovered That Combined of Clickjacking, Pastejacking and Self-XSS Attacks

New Attack Called “XSSJacking” Discovered That Combined of Clickjacking, Pastejacking and Self-XSS Attacks A New Attack method called “XSSJacking” a type of Web application Clickjacking, Pastejacking and Self-XSS  Web application based Attack Discovered by the Security Researcher Dylan Ayrey. While Clickjacking vulnerability existing in particular page, this attack will trigger Self-XSS. “Self – XSS is a social engineering attack used to gain control of victims’ web accounts.In a self – XSS attack, the victim of the attack accidentally runs malicious code in his/her own web browser, thus exposing it to the attacker “ Clickjacking Attack performs when an attacker to trick a user into clicking on a button or link on another page when they were intending to click on the top level page. Thus, the attacker is “hijacking” clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both. How “XSSJacking” Works...

hackers heroes of the computer revolution

hackers heroes of the computer revolution view book

How To access Deep Anonymous web and know its Secretive and Mysterious activities

How To access Deep Anonymous web and know its Secretive and Mysterious activities What is Deep Web The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard search engines for any reason. The opposite term to the deep web is the surface web. The deep web includes many very common uses such as web mail, online banking but also paid for services with a paywall such as video on demand, and many more. This part of the Internet is known as the Deep Web, and it is about 500 times the size of the Web that we know. The Deep Web vs. The Dark Web Deep Web is  the portion of the Internet that is hidden from conventional search engines, as by encryption; the aggregate of unindexed websites The  Dark Web   on the other hand, is defined as “the portion of the Internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser: ...

new CIA leaks

new CIA leaks direct link

Hack-with-Github/Kali-Linux

Hack-with-Github/Kali-Linux   for more information press here  

How can I monitor the CPU temperature under linux?

How can I monitor the CPU temperature under linux  i'll explain in this post how can you monitor the cpu temperature by different methods method 1 you need the lm-sensors package.  I thought I should mention that in addition to installing the package, you should run the sensors-detect command to identify the kernel modules that need to be loaded.  If you haven't done this, manually run this once and check if it detects any sensors on board your computer. $ sudo sensors-detect # sensors-detect revision 5249 (2008-05-11 22:56:25 +0200) This program will help you determine which kernel modules you need to load to use lm_sensors most effectively. It is generally safe and recommended to accept the default answers to all questions, unless you know what you're doing.     If you're lucky, your laptop will support an array of sensors. If not, you may still find a basic set of sensors for the CPU:     $ sensors acp...

what is the best programming language

what is the best programming language   or what is the  programming language that you should  learn  it first ومن يريد جميع الكتب المذكوره بالصوره فهذه هي روابط الكتب 1--python https://www.up-4ever.com/55xukx3vfkgb 2--java https://www.up-4ever.com/yjquk2d7tnrh 3--java script https://www.up-4ever.com/o10zu39zc4fy 4--ruby https://www.up-4ever.com/ogumny86ju6s 5--c# https://www.up-4ever.com/7ghg4guzb06q 6--c++ https://www.up-4ever.com/7f2mbsu6td73 7--php https://www.up-4ever.com/m8ec1mm7z74w 8--c https://www.up-4ever.com/xw8zcus5wxqd 9--c{opjective} https://www.up-4ever.com/8ee2xwstdnlz

Creating an Evil Twin Wireless Access Point to Eavesdrop on Data

Creating an Evil Twin Wireless Access Point to Eavesdrop on Data Welcome back, my greenhorn hackers! Now that we're familiar with the technologies, terminology, and the aircrack-ng suite, we can finally start hacking Wi-Fi. Our first task will be to creating an evil twin access point . Many new hackers are anxious to crack Wi-Fi passwords to gain some free bandwidth (don't worry, we'll get to that), but there are so many other Wi-Fi hacks that are far more powerful and put so much more at risk than a bit of bandwidth. What's an Evil Twin AP? The evil twin AP is an access point that looks and acts just like a legitimate AP and entices the end-user to connect to our access point. Our aircrack-ng suite has a tool, airbase-ng , that can be used to convert our wireless adapter into an access point. This is a powerful client-side hack that will enable us to see all ...