400k Linux servers compromised for cryptotheft and financial gain
https://www.welivesecurity.com/en/eset-research/ebury-alive-unseen-400k-linux-servers-compromised-cryptotheft-financial-gain
I sent the group link to people who will work with me on this bot. Please check the group I sent.
Читать полностью…البوت ده اصلا احنا قربنا نسحب عليه على نص الشهر اللي احنا فيه ده ان شاء الله فانا محتاجه عدد معين
Читать полностью…/channel/the_capybara_meme_bot/start?startapp=bd40d6385cfbe019de8b684c2ed6bd60
🌟 Click here to boost me to win a 0.2 TON reward! ASAP
ده اهم بوت شغالين عليه الفترة دي وقت الادراج قريب جدا ادخل خلص المهمات اربط محفظة التلجرام انتظر ربحك لو اي حد اتوقف معاه اي حاجه يكلمني خاص
Читать полностью…Bypass-Four03: is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulation techniques. It also includes fuzzing for HTTP methods and protocol versions, making it a versatile addition to any web security researcher's toolkit
https://github.com/nazmul-ethi/Bypass-Four03
Segugio: allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracting the malware's final stage configuration
https://github.com/reecdeep/segugio
SubOwner: A Simple tool check for subdomain takeovers
https://github.com/ifconfig-me/subowner
Extracting Credentials From Windows Logs
https://practicalsecurityanalytics.com/extracting-credentials-from-windows-logs
Exploiting Microsoft Kernel Applocker Driver (CVE-2024-38041)
https://csa.limited/blog/20240916-Exploiting-Microsoft-Kernel-Applocker-Driver.html
NyxInvoke: is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features
https://github.com/BlackSnufkin/NyxInvoke
DodgeBox: A deep dive into the updated arsenal of APT41 | Part 1
https://www.zscaler.com/blogs/security-research/dodgebox-deep-dive-updated-arsenal-apt41-part-1
We are already close to drawing this bot for the middle of the month we are in, God willing, so I need a certain number.
Читать полностью…هبعت لينك الجروب للناس اللي هتشتغل معايا على البوت ده تخش في الجروب اللي انا هبعته
Читать полностью…user-kernel-syscall-hook: Combining Kernel and User-Mode Hooks for Enhanced System Monitoring
https://github.com/carlos-al/user-kernel-syscall-hook
/channel/blum/app?startapp=ref_ZDFWZ8nmHz
Join me on Blum and let's earn together! Use my invite link to join the fun. 🌟
PPLrevenant: This is a proof-of-concept that shows how a technique such as Bring Your Own Vulnerable DLL (BYODLL) could be used to bypass LSA Protection, or more generally execute arbitrary code within Protected Processes on Windows
https://github.com/itm4n/PPLrevenant
Generate AES128 and AES256 Kerberos keys from a given username, password, and realm
https://github.com/seriotonctf/kerberos_aes_key
Revisiting MiniFilter Abuse Technique to Blind EDR
https://tierzerosecurity.co.nz/2024/09/18/blind-edr-revisited.html
PoC for CVE-2024-7965 This is the vulnerability in the V8 that occurs only within
https://github.com/bi-zone/CVE-2024-7965
CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection
https://github.com/horizon3ai/CVE-2024-8190