Forwarded from RedBlueTM Hit (𒆜☠҉️҉ ҉₮҉Ⱨ҉𝟛҉ ҉₲҉Ⱨ҉𝟘҉₴҉₮҉ ҉☠҉️҉𒆜)
#SensePost | Applied Web Application Hacking
Info: https://www.orangecyberdefense.com/global/datasheets/sensepost-awah
Pass:
@Hide01 📰
@RedBlueHit 💀👀
@RedBlueTM 🔒
Info: https://www.orangecyberdefense.com/global/datasheets/sensepost-awah
Pass:
@hexleakworld@Hide01 📰
@RedBlueHit 💀👀
@RedBlueTM 🔒
Forwarded from RedBlueTM Hit (Hide01)
#First_Time_Ever 🔥
#Exclusive🔥
FOR585: Smartphone Forensic Analysis In-Depth 2022 [Latest]🔥
🔗 Download: https://hide01.ir/smartphone-forensic-analysis-in-depth
🆘 How to download the course? Please visit this links👇🏻
https://hide01.ir/usage
https://t.iss.one/Hide01/509
@Hide01 📰
@RedBlueHit 💀👀
@RedBlueTM 🔒
#Exclusive
FOR585: Smartphone Forensic Analysis In-Depth 2022 [Latest]
https://hide01.ir/usage
https://t.iss.one/Hide01/509
@Hide01 📰
@RedBlueHit 💀👀
@RedBlueTM 🔒
Please open Telegram to view this post
VIEW IN TELEGRAM
Imam Ali ( Peace be Upon Him ) addressing his son: My son! One who associates with scholars and intellectuals will gain greatness from them, and one who associates with low life people will become low life and insignificant.
#FollowerOfAli
#FollowerOfAli
❤5👎2
Malware Development Series:
Malware development: persistence - part 1. Registry run keys. C++ example.
Malware development: persistence - part 2. Screensaver hijack. C++ example.
Malware development: persistence - part 3. COM DLL hijack.
Malware development: persistence - part 4. Windows services. Simple C++ example.
Malware development: persistence - part 5. AppInit_DLLs. Simple C++ example.
Malware development: persistence - part 6. Windows netsh helper DLL. Simple C++ example.
Malware AV evasion: part 7. Disable Windows Defender. Simple C++ example.
Malware AV evasion - part 8. Encode payload via Z85 algorithm. C++ example.
Malware AV evasion - part 9. Encrypt base64 encoded payload via RC4. C++ example.
Malware AV/VM evasion - part 10: anti-debugging. NtGlobalFlag. Simple C++ example.
Malware AV/VM evasion - part 11: encrypt payload via DES. Simple C++ example.
Malware AV/VM evasion - part 12: encrypt/decrypt payload via TEA. Simple C++ example.
Malware AV/VM evasion - part 13: encrypt/decrypt payload via Madryga. Simple C++ example.
Malware AV/VM evasion - part 14: encrypt/decrypt payload via A5/1. Bypass Kaspersky AV. Simple C++ example.
Malware AV/VM evasion - part 15: WinAPI GetModuleHandle implementation. Simple C++ example.
Malware AV/VM evasion - part 16: WinAPI GetProcAddress implementation. Simple C++ example.
Malware AV/VM evasion - part 17: bypass UAC via fodhelper.exe. Simple C++ example.
Malware AV/VM evasion - part 18: encrypt/decrypt payload via modular multiplication-based block cipher. Simple C++ example.
Malware development: persistence - part 22. Windows Setup. Simple C++ example.
Malware and cryptography 1: encrypt/decrypt payload via RC5. Simple C++ example.
Malware and cryptography 20: encrypt/decrypt payload via Skipjack. Simple C++ example.
Malware and cryptography 21: encrypt/decrypt payload via WAKE. Simple C++ example.
Malware development: persistence - part 23. LNK files. Simple Powershell example.
Malware development: persistence - part 24. StartupApproved. Simple C example.
Malware and cryptography 22: encrypt/decrypt payload via XTEA. Simple C++ example.
Malware and cryptography 23: encrypt/decrypt file via TEA. Simple C/C++ example.
Malware and cryptography 24: encrypt/decrypt file via Madryga. Simple C/C++ example.
Malware and cryptography 25: encrypt/decrypt payload via RC6. Simple C/C++ example.
Malware AV/VM evasion - part 15: WinAPI GetModuleHandle implementation. Simple C++ example.
Malware AV/VM evasion - part 16: WinAPI GetProcAddress implementation. Simple C++ example.
Malware AV/VM evasion - part 17: bypass UAC via fodhelper.exe. Simple C++ example.
Malware AV/VM evasion - part 18: encrypt/decrypt payload via modular multiplication-based block cipher. Simple C++ example.
Malware development: persistence - part 22. Windows Setup. Simple C++ example.
Malware and cryptography 1: encrypt/decrypt payload via RC5. Simple C++ example.
Malware and cryptography 20: encrypt/decrypt payload via Skipjack. Simple C++ example.
Malware and cryptography 21: encrypt/decrypt payload via WAKE. Simple C++ example.
#malware
#cpp
Malware development: persistence - part 1. Registry run keys. C++ example.
Malware development: persistence - part 2. Screensaver hijack. C++ example.
Malware development: persistence - part 3. COM DLL hijack.
Malware development: persistence - part 4. Windows services. Simple C++ example.
Malware development: persistence - part 5. AppInit_DLLs. Simple C++ example.
Malware development: persistence - part 6. Windows netsh helper DLL. Simple C++ example.
Malware AV evasion: part 7. Disable Windows Defender. Simple C++ example.
Malware AV evasion - part 8. Encode payload via Z85 algorithm. C++ example.
Malware AV evasion - part 9. Encrypt base64 encoded payload via RC4. C++ example.
Malware AV/VM evasion - part 10: anti-debugging. NtGlobalFlag. Simple C++ example.
Malware AV/VM evasion - part 11: encrypt payload via DES. Simple C++ example.
Malware AV/VM evasion - part 12: encrypt/decrypt payload via TEA. Simple C++ example.
Malware AV/VM evasion - part 13: encrypt/decrypt payload via Madryga. Simple C++ example.
Malware AV/VM evasion - part 14: encrypt/decrypt payload via A5/1. Bypass Kaspersky AV. Simple C++ example.
Malware AV/VM evasion - part 15: WinAPI GetModuleHandle implementation. Simple C++ example.
Malware AV/VM evasion - part 16: WinAPI GetProcAddress implementation. Simple C++ example.
Malware AV/VM evasion - part 17: bypass UAC via fodhelper.exe. Simple C++ example.
Malware AV/VM evasion - part 18: encrypt/decrypt payload via modular multiplication-based block cipher. Simple C++ example.
Malware development: persistence - part 22. Windows Setup. Simple C++ example.
Malware and cryptography 1: encrypt/decrypt payload via RC5. Simple C++ example.
Malware and cryptography 20: encrypt/decrypt payload via Skipjack. Simple C++ example.
Malware and cryptography 21: encrypt/decrypt payload via WAKE. Simple C++ example.
Malware development: persistence - part 23. LNK files. Simple Powershell example.
Malware development: persistence - part 24. StartupApproved. Simple C example.
Malware and cryptography 22: encrypt/decrypt payload via XTEA. Simple C++ example.
Malware and cryptography 23: encrypt/decrypt file via TEA. Simple C/C++ example.
Malware and cryptography 24: encrypt/decrypt file via Madryga. Simple C/C++ example.
Malware and cryptography 25: encrypt/decrypt payload via RC6. Simple C/C++ example.
Malware AV/VM evasion - part 15: WinAPI GetModuleHandle implementation. Simple C++ example.
Malware AV/VM evasion - part 16: WinAPI GetProcAddress implementation. Simple C++ example.
Malware AV/VM evasion - part 17: bypass UAC via fodhelper.exe. Simple C++ example.
Malware AV/VM evasion - part 18: encrypt/decrypt payload via modular multiplication-based block cipher. Simple C++ example.
Malware development: persistence - part 22. Windows Setup. Simple C++ example.
Malware and cryptography 1: encrypt/decrypt payload via RC5. Simple C++ example.
Malware and cryptography 20: encrypt/decrypt payload via Skipjack. Simple C++ example.
Malware and cryptography 21: encrypt/decrypt payload via WAKE. Simple C++ example.
#malware
#cpp
cocomelonc
Malware development: persistence - part 1. Registry run keys. C++ example.
﷽
🔥2
pwn.college is an education platform for students (and other interested parties) to learn about, and practice, core cybersecurity concepts in a hands-on fashion. In martial arts terms, it is designed to take a “white belt” in cybersecurity through the journey to becoming a “blue belt”, able to approach (simple) cybersecurity competitions (CTFs) and wargames. Our philosophy is “practice makes perfect”.
pwn.college
pwn.college
🔥1
HACKE-RC/awesome-reversing: A collection of resources to learn Reverse Engineering from start!
https://github.com/HACKE-RC/awesome-reversing
https://github.com/HACKE-RC/awesome-reversing
GitHub
GitHub - HACKE-RC/awesome-reversing: A collection of resources to learn Reverse Engineering from start!
A collection of resources to learn Reverse Engineering from start! - HACKE-RC/awesome-reversing
🔥2
Forwarded from Proxy Bar
cve-2024-6387-poc.zip
21.1 KB
1- Go to /wp-login.php?action=register
2- Register with the name admin if it is available
3- Go to the email
4- Then you will see that the registration has been completed. Log in to the admin panel. and congratulations, you have obtained admin permission
#wordpress
2- Register with the name admin if it is available
3- Go to the email
4- Then you will see that the registration has been completed. Log in to the admin panel. and congratulations, you have obtained admin permission
#wordpress
Collection of links to write-ups, related to cybersecurity, reverse engineering and exploitation
https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md
https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md
GitHub
awesome-list/topics/cybersec.md at main · 0xor0ne/awesome-list
Cybersecurity oriented awesome list. Contribute to 0xor0ne/awesome-list development by creating an account on GitHub.
Discover Scilla, a powerful info-gathering tool built in GO!
Efficiently perform subdomain enumeration, DNS lookup, port scanning and directory bruteforcing.
https://github.com/edoardottt/scilla
Efficiently perform subdomain enumeration, DNS lookup, port scanning and directory bruteforcing.
https://github.com/edoardottt/scilla
GitHub
GitHub - edoardottt/scilla: Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration
Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration - edoardottt/scilla
💯1
Awesome Vulnerable Applications.
- Online;
- Paid;
- Vulnerable VMs;
- Cloud Security;
- SSO - Single Sign On;
- Mobile Security;
OWASP Top 10;
- SQL Injection;
- XSS Injection;
- Server Side Request Forgery;
- CORS Misconfiguration;
- XXE Injection;
- Request Smuggling;
Technologies;
- WordPress;
- Node.js;
- Firmware;
- Uncategorized.
https://github.com/vavkamil/awesome-vulnerable-apps/
- Online;
- Paid;
- Vulnerable VMs;
- Cloud Security;
- SSO - Single Sign On;
- Mobile Security;
OWASP Top 10;
- SQL Injection;
- XSS Injection;
- Server Side Request Forgery;
- CORS Misconfiguration;
- XXE Injection;
- Request Smuggling;
Technologies;
- WordPress;
- Node.js;
- Firmware;
- Uncategorized.
https://github.com/vavkamil/awesome-vulnerable-apps/
GitHub
GitHub - vavkamil/awesome-vulnerable-apps: Awesome Vulnerable Applications
Awesome Vulnerable Applications. Contribute to vavkamil/awesome-vulnerable-apps development by creating an account on GitHub.