Skip to main content

Posts

minergate local crash exploit

minergate local crash exploit Published Credit Risk 2017.04.25 R3d-D3v!L Low CWE CVE Local Remote N/A N/A Yes No    -=-=-=-=-=-=-=-{In The Name Of Allah The Mercifull}-=-=-=-=-=-=-=- [~] Tybe:local crash exploit [~] Vendor: https://minergate.com/downloads/gui [+] Software:minergate [+] infection: crash exploit [~] Version : [~] author: R3d-D3v!L [+] TEAM: ABH [?] contact: X[at]hotmail.co.jp [-] [?] Date: 25.4pr.2ol7 [?] T!ME: 04:54 am GMT [?] Home: abhsec.blogspot.com [^] [?] ===================================================================================== # minergate local crash exploit ===================================================================================== [!] Exploit Already Tested ... on kali linux [^] Error console:- crash ...

OnionShare: Securely and anonymously share file

OnionShare lets you securely and anonymously share files of any size. It works by starting a web server, making it accessible as a Tor onion service, and generating an unguessable URL to access and download the files. It doesn’t require setting up a server on the internet somewhere or using a third party file-sharing service. You host the file on your own computer and use a Tor onion service to make it temporarily accessible over the internet. The other user just needs to use Tor Browser to download the file from you. Features: A user-friendly drag-and-drop graphical user interface that works in Windows, Mac OS X, and Linux Ability to share multiple files and folders at once Support for multiple people downloading files at once Automatically copies the unguessable URL to your clipboard Shows you the progress of file transfers When file is done transferring, automatically closes OnionShare to reduce the attack surface Localized into several languages, and su...

setting up persistent connection using meterpreter

setting up persistent connection using meterpreter expert metasploit penetration testing course episode 26 for all course please follow this link expert metasploit penetration testing course

FUZZBUNCH DEMO : leaked CIA tool

Just to show how powerful this tool is

Best Vulnerability Scanners Tools

Best Vulnerability Scanners Tools    The scanners which assess the vulnerability of a network or a computer to security attacks are known as Vulnerability Scanners. The tools might function differently, however all of them aim to provide an analysis on how vulnerable the system or a network is. Here is a list of the best ones:   Nessus Nessus is the world’s most popular vulnerable scanner topping the list in the years 2000, 2003 and in the year 2006 survey on security tools. It’s a free to use vulnerability scanner for personal use in the non enterprise environment. OpenVAS This scanner is tipped by many to be the most advanced vulnerability scanner in the world and is a powerful and comprehensive tool for scanning as well as providing solutions for vulnerability management. It is free software and is maintained daily. Nipper It is a parser for network infrastructure and its full form is Network Infrastructure Parser. This open sour...

shadow Brokers leaked files

Exploits EARLYSHOVEL RedHat 7.0 - 7.1 Sendmail 8.11.x exploit EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86. ECHOWRECKER remote Samba 3.0.x Linux exploit. EASYBEE appears to be an MDaemon email server vulnerability EASYPI is an IBM Lotus Notes exploit that gets detected as Stuxnet EWOKFRENZY is an exploit for IBM Lotus Domino 6.5.4 & 7.0.2 EXPLODINGCAN is an IIS 6.0 exploit that creates a remote backdoor ETERNALROMANCE is a SMB1 exploit over TCP port 445 which targets XP, 2003, Vista, 7, Windows 8, 2008, 2008 R2, and gives SYSTEM privileges (MS17-010) EDUCATEDSCHOLAR is a SMB exploit (MS09-050) EMERALDTHREAD is a SMB exploit for Windows XP and Server 2003 (MS10-061) EMPHASISMINE is a remote IMAP exploit for IBM Lotus Domino 6.6.4 to 8.5.2 ENGLISHMANSDENTIST sets Outlook Exchange WebAccess rules to trigger executable code on the client's side to send an email to other...

New Attack Called “XSSJacking” Discovered That Combined of Clickjacking, Pastejacking and Self-XSS Attacks

New Attack Called “XSSJacking” Discovered That Combined of Clickjacking, Pastejacking and Self-XSS Attacks A New Attack method called “XSSJacking” a type of Web application Clickjacking, Pastejacking and Self-XSS  Web application based Attack Discovered by the Security Researcher Dylan Ayrey. While Clickjacking vulnerability existing in particular page, this attack will trigger Self-XSS. “Self – XSS is a social engineering attack used to gain control of victims’ web accounts.In a self – XSS attack, the victim of the attack accidentally runs malicious code in his/her own web browser, thus exposing it to the attacker “ Clickjacking Attack performs when an attacker to trick a user into clicking on a button or link on another page when they were intending to click on the top level page. Thus, the attacker is “hijacking” clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both. How “XSSJacking” Works...