A Massive Exploiting Tool
TheFatRat is an exploiting tool which compiles a malware with famous payload, and then the compiled maware can be executed on Linux , Windows , Mac and Android. TheFatRat Provides An Easy way to create Backdoors and Payload which can bypass most anti-virus
Features !
⚪️ Fully Automating MSFvenom & Metasploit.
⚪️ Local or remote listener Generation.
⚪️ Easily Make Backdoor by category Operating System.
⚪️ Generate payloads in Various formats.
⚪️ Bypass anti-virus backdoors.
⚪️ File pumper that you can use for increasing the size of your files.
⚪️ The ability to detect external IP & Interface address .
⚪️ Automatically creates AutoRun files for USB / CDROM exploitation
GitHub
#C #Rat #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
TheFatRat is an exploiting tool which compiles a malware with famous payload, and then the compiled maware can be executed on Linux , Windows , Mac and Android. TheFatRat Provides An Easy way to create Backdoors and Payload which can bypass most anti-virus
Features !
⚪️ Fully Automating MSFvenom & Metasploit.
⚪️ Local or remote listener Generation.
⚪️ Easily Make Backdoor by category Operating System.
⚪️ Generate payloads in Various formats.
⚪️ Bypass anti-virus backdoors.
⚪️ File pumper that you can use for increasing the size of your files.
⚪️ The ability to detect external IP & Interface address .
⚪️ Automatically creates AutoRun files for USB / CDROM exploitation
GitHub
#C #Rat #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
🔥1
Main Features
Pre-Compiled
Github
#c #windows #binder #open_source
Please open Telegram to view this post
VIEW IN TELEGRAM
🏆3
POC Pdf-exploit builder on C#
Exploitable versions: Foxit Reader, Adobe Acrobat V9(maybe).
Put your exe-link and build the PDF-FILE
BugCod3#C #PDF #Exploit
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡3🔥3❤2👎2
Mali GPU Kernel LPE
Android 14 kernel exploit for Pixel7/8 Pro
This article provides an in-depth analysis of two kernel vulnerabilities within the Mali GPU, reachable from the default application sandbox, which I independently identified and reported to Google. It includes a kernel exploit that achieves arbitrary kernel r/w capabilities. Consequently, it disables SELinux and elevates privileges to root on Google Pixel 7 and 8 Pro models running the following Android 14 versions:
Pixel 8 Pro:
Pixel 7 Pro:
Pixel 7 Pro:
Pixel 7:
Vulnerabilities:
This exploit leverages two vulnerabilities: an integer overflow resulting from an incomplete patch in the
Github
⬇️ Download
🔓
#C #Exploit #Android #Kernel #Pixel
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Android 14 kernel exploit for Pixel7/8 Pro
This article provides an in-depth analysis of two kernel vulnerabilities within the Mali GPU, reachable from the default application sandbox, which I independently identified and reported to Google. It includes a kernel exploit that achieves arbitrary kernel r/w capabilities. Consequently, it disables SELinux and elevates privileges to root on Google Pixel 7 and 8 Pro models running the following Android 14 versions:
Pixel 8 Pro:
google/husky/husky:14/UD1A.231105.004/11010374:user/release-keysPixel 7 Pro:
google/cheetah/cheetah:14/UP1A.231105.003/11010452:user/release-keysPixel 7 Pro:
google/cheetah/cheetah:14/UP1A.231005.007/10754064:user/release-keysPixel 7:
google/panther/panther:14/UP1A.231105.003/11010452:user/release-keysVulnerabilities:
This exploit leverages two vulnerabilities: an integer overflow resulting from an incomplete patch in the
gpu_pixel_handle_buffer_liveness_update_ioctl ioctl command, and an information leak within the timeline stream message buffers.Github
⬇️ Download
🔓
BugCod3#C #Exploit #Android #Kernel #Pixel
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
❤1⚡1👍1🔥1
Search inside every file, folder and subfolder for OSINT
(based on the book The Hobbit, Smaug the dragon)
It is not an online tool. This program scans your local database to search a variable you specified inside each file with bruteforce.
This tool has been created for utility to search inside every file which contains your input,
and also not all files/folders are supported (outside UTF-8 unicode) atm.
Could be useful for osint individuals.
make inside smaug-mainmake inside smaug-main.Makefile under smaug-main.BugCod3#C #Smaug #OSINT
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡3❤2🔥2