Cyber0жff666 λ
115 subscribers
167 photos
209 files
522 links
Cyber intelligence corporation.

C, C++, Assembly, UNIX, Malwares, Ransomwares, Information Security, Networks and Anonymity

new group link in: @intell666
Download Telegram
Twitter 200M+ Scraped Data | 2023

Format - Email,Name,ScreenName,Followers,CreatedDate

Download - https://root.direct/twitter200M
​​ChatGPT for Google

Расширение Chrome для отображения ответа ChatGPT в результатах поиска Google.

https://github.com/wong2/chat-gpt-google-extension

#chrome #bot
👍21
Crypto_Crime_Report_2023.pdf
43.4 MB
📓 The 2023 Crypto Crime Report
Everything you need to know about cryptocurrency-based crime
Arpoison and Ettercap are used to perform ARP poisoning.
​​Spark

Spark is a free, safe, open-source, web-based, cross-platform and full-featured RAT (Remote Administration Tool) that allow you to control all your devices via browser anywhere.

https://github.com/XZB-1248/Spark

#redteam
🦈 Приручаем акулу. Wireshark Mindmap.

• Многим из Вас знаком Wireshark — анализатор пакетов, программа номер один для сетевого анализа, траблшутинга, разработки программных и коммуникационных протоколов, а также всем, что связано с обучением нетворкингу.

• Для изучения и использования данного инструмента, предлагаю ознакомиться с очень полезной Mindmap, которая поможет сократить время при выполнении определенных задач: https://github.com/Ignitetechnologies/Mindmap

• P.S. Обязательно ознакомься с материалом "Лайфхаки на каждый день" и другой полезной информацией по хештегу #Wireshark.
Microsoft (source code) Leak

Source codes of the following Bing products, Bing Maps and Cortana. There are many digital signatures of Microsoft products in the leak. Many of them have not been recalled. Go ahead and your software will have the same level of trust as the original Microsoft product. Tell me about your successes.

DOWNLOAD!
👍1
1 - Information Gathering
Discover Network Hosts
Enumerate Listening Services
Discover Vulnerabilities


2 - Focused Penetration
Compromise Vulnerable Hosts (level 1)
[Exploit missing software patches]
[Deploy custom executable payloads]
[Acess remote management interfaces - RMI]


3 - Privilege Escalation
Estabilish Persistent Re-entry
Havest User Credentials
Pass Credentials to New Hosts(level 2)
[Identify privileged user accountd]
[Elevate to domain admin]


4 - Documentation
Gather Screenshots
Create Linear Attack Narratives
Create Final Deliverable

Enjoy
@CyberTemple