Crypto_Crime_Report_2023.pdf
43.4 MB
📓 The 2023 Crypto Crime Report
Everything you need to know about cryptocurrency-based crime
Malware
YARA rules, programs for ransomware families
https://github.com/rivitna/Malware
darkbit:
https://github.com/rivitna/Malware/tree/main/DarkBit/darkbit_demo
YARA rules, programs for ransomware families
https://github.com/rivitna/Malware
darkbit:
https://github.com/rivitna/Malware/tree/main/DarkBit/darkbit_demo
👍1
Spark
Spark is a free, safe, open-source, web-based, cross-platform and full-featured RAT (Remote Administration Tool) that allow you to control all your devices via browser anywhere.
https://github.com/XZB-1248/Spark
#redteam
Spark is a free, safe, open-source, web-based, cross-platform and full-featured RAT (Remote Administration Tool) that allow you to control all your devices via browser anywhere.
https://github.com/XZB-1248/Spark
#redteam
🦈 Приручаем акулу. Wireshark Mindmap.
• Многим из Вас знаком Wireshark — анализатор пакетов, программа номер один для сетевого анализа, траблшутинга, разработки программных и коммуникационных протоколов, а также всем, что связано с обучением нетворкингу.
• Для изучения и использования данного инструмента, предлагаю ознакомиться с очень полезной Mindmap, которая поможет сократить время при выполнении определенных задач: https://github.com/Ignitetechnologies/Mindmap
• P.S. Обязательно ознакомься с материалом "Лайфхаки на каждый день" и другой полезной информацией по хештегу #Wireshark.
• Многим из Вас знаком Wireshark — анализатор пакетов, программа номер один для сетевого анализа, траблшутинга, разработки программных и коммуникационных протоколов, а также всем, что связано с обучением нетворкингу.
• Для изучения и использования данного инструмента, предлагаю ознакомиться с очень полезной Mindmap, которая поможет сократить время при выполнении определенных задач: https://github.com/Ignitetechnologies/Mindmap
• P.S. Обязательно ознакомься с материалом "Лайфхаки на каждый день" и другой полезной информацией по хештегу #Wireshark.
Microsoft (source code) Leak
Source codes of the following Bing products, Bing Maps and Cortana. There are many digital signatures of Microsoft products in the leak. Many of them have not been recalled. Go ahead and your software will have the same level of trust as the original Microsoft product. Tell me about your successes.
DOWNLOAD!👍1
Forwarded from .
LinkedIn Full Database Breach 2021
https://fortune.com/2021/04/08/linkedin-user-data-breach-leak-hackers/
LinkedIn resumes 2015 - 2018
Georgia: https://www.mediafire.com/file/1t6yr25e1jvfswn/GE.zip/file
File size: 2.1GB
Ukraine: https://www.mediafire.com/file/vvektay6ebspgvr/file
https://t.iss.one/BreachedData/7
File size: 1.16GB
Russia: https://www.mediafire.com/file/my84k94357h9ssn/file
File size: 3.61GB
Belarus: https://www.sendspace.com/file/k7564o
File Size: 228.28MB
https://fortune.com/2021/04/08/linkedin-user-data-breach-leak-hackers/
LinkedIn resumes 2015 - 2018
Georgia: https://www.mediafire.com/file/1t6yr25e1jvfswn/GE.zip/file
File size: 2.1GB
Ukraine: https://www.mediafire.com/file/vvektay6ebspgvr/file
https://t.iss.one/BreachedData/7
File size: 1.16GB
Russia: https://www.mediafire.com/file/my84k94357h9ssn/file
File size: 3.61GB
Belarus: https://www.sendspace.com/file/k7564o
File Size: 228.28MB
Forwarded from .
.
LinkedIn Full Database Breach 2021 https://fortune.com/2021/04/08/linkedin-user-data-breach-leak-hackers/ LinkedIn resumes 2015 - 2018 Georgia: https://www.mediafire.com/file/1t6yr25e1jvfswn/GE.zip/file File size: 2.1GB Ukraine: https://www.mediafire.com…
Türkçe: LinkedIn Tam Veritabanı İhlali 2021
@İhlaldata #İhlaldata #LinkedIn
https://fortune.com/2021/04/08/linkedin-user-data-breach-leak-hackers/
LinkedIn 2015 - 2018'e devam ediyor
Gürcistan: https://www.mediafire.com/file/1t6yr25e1jvfswn/GE.zip/file
Dosya boyutu: 2.1GB
Ukrayna: https://www.mediafire.com/file/vvektay6ebspgvr/file
https://t.iss.one/BreachedData/7
Dosya boyutu: 1.16GB
Rusya: https://www.mediafire.com/file/my84k94357h9ssn/file
Dosya boyutu: 3.61GB
Beyaz Rusya: https://www.sendspace.com/file/k7564o
Dosya Boyutu: 228.28MB
@İhlaldata #İhlaldata #LinkedIn
https://fortune.com/2021/04/08/linkedin-user-data-breach-leak-hackers/
LinkedIn 2015 - 2018'e devam ediyor
Gürcistan: https://www.mediafire.com/file/1t6yr25e1jvfswn/GE.zip/file
Dosya boyutu: 2.1GB
Ukrayna: https://www.mediafire.com/file/vvektay6ebspgvr/file
https://t.iss.one/BreachedData/7
Dosya boyutu: 1.16GB
Rusya: https://www.mediafire.com/file/my84k94357h9ssn/file
Dosya boyutu: 3.61GB
Beyaz Rusya: https://www.sendspace.com/file/k7564o
Dosya Boyutu: 228.28MB
Forwarded from .
.
LinkedIn Full Database Breach 2021 https://fortune.com/2021/04/08/linkedin-user-data-breach-leak-hackers/ LinkedIn resumes 2015 - 2018 Georgia: https://www.mediafire.com/file/1t6yr25e1jvfswn/GE.zip/file File size: 2.1GB Ukraine: https://www.mediafire.com…
az: Linkedın verilənlər bazasının tamamilə pozulması 2021
@Pozulmuş məlumatlar # pozulmuş məlumatlar # Linkedın
https://fortune.com/2021/04/08/linkedin-user-data-breach-leak-hackers/
Linkedın Xülasəsi 2015 - 2018
Gürcüstan: https://www.mediafire.com/file/1t6yr25e1jvfswn/GE.zip/file
Fayl ölçüsü: 2.1 GB
Ukrayna: https://www.mediafire.com/file/vvektay6ebspgvr/file
https://t.iss.one/BreachedData/7
Fayl ölçüsü: 1.16 GB
Rusiya: https://www.mediafire.com/file/my84k94357h9ssn/file
Fayl ölçüsü: 3.61 GB
Belarus: https://www.sendspace.com/file/k7564o
Fayl ölçüsü: 228.28 mb
@Pozulmuş məlumatlar # pozulmuş məlumatlar # Linkedın
https://fortune.com/2021/04/08/linkedin-user-data-breach-leak-hackers/
Linkedın Xülasəsi 2015 - 2018
Gürcüstan: https://www.mediafire.com/file/1t6yr25e1jvfswn/GE.zip/file
Fayl ölçüsü: 2.1 GB
Ukrayna: https://www.mediafire.com/file/vvektay6ebspgvr/file
https://t.iss.one/BreachedData/7
Fayl ölçüsü: 1.16 GB
Rusiya: https://www.mediafire.com/file/my84k94357h9ssn/file
Fayl ölçüsü: 3.61 GB
Belarus: https://www.sendspace.com/file/k7564o
Fayl ölçüsü: 228.28 mb
Forwarded from .
.
LinkedIn Full Database Breach 2021 https://fortune.com/2021/04/08/linkedin-user-data-breach-leak-hackers/ LinkedIn resumes 2015 - 2018 Georgia: https://www.mediafire.com/file/1t6yr25e1jvfswn/GE.zip/file File size: 2.1GB Ukraine: https://www.mediafire.com…
la: LinkedIn Plenam Datorum Contritionem 2021
Vendedo R De Sonhos #LinkedIn
https://fortune.com/2021/04/08/linkedin-user-data-breach-leak-hackers/
Linkedin resumes 2015 - 2018
Georgiae: https://www.mediafire.com/file/1t6yr25e1jvfswn/GE.zip/file
Magnitudo fasciculi: 2.1 GB
Ucrainae: https://www.mediafire.com/file/vvektay6ebspgvr/file
https://t.iss.one/BreachedData/7
Magnitudo fasciculi: 1.16 GB
Russia: https://www.mediafire.com/file/my84k94357h9ssn/file
Magnitudo fasciculi: 3.61 GB
Belarus: https://www.sendspace.com/file/k7564o
Magnitudo fasciculi: 228.28 MB
Vendedo R De Sonhos #LinkedIn
https://fortune.com/2021/04/08/linkedin-user-data-breach-leak-hackers/
Linkedin resumes 2015 - 2018
Georgiae: https://www.mediafire.com/file/1t6yr25e1jvfswn/GE.zip/file
Magnitudo fasciculi: 2.1 GB
Ucrainae: https://www.mediafire.com/file/vvektay6ebspgvr/file
https://t.iss.one/BreachedData/7
Magnitudo fasciculi: 1.16 GB
Russia: https://www.mediafire.com/file/my84k94357h9ssn/file
Magnitudo fasciculi: 3.61 GB
Belarus: https://www.sendspace.com/file/k7564o
Magnitudo fasciculi: 228.28 MB
CVE-2023-25136 : Double-free vulnerability in OpenSSH 9.1 mass scan & exploit
https://github.com/Christbowel/CVE-2023-25136
👉 Follow: Kingsman
https://github.com/Christbowel/CVE-2023-25136
👉 Follow: Kingsman
GitHub
GitHub - Christbowel/CVE-2023-25136: OpenSSH 9.1 vulnerability mass scan and exploit
OpenSSH 9.1 vulnerability mass scan and exploit. Contribute to Christbowel/CVE-2023-25136 development by creating an account on GitHub.
1 - Information Gathering
Discover Network Hosts
Enumerate Listening Services
Discover Vulnerabilities
2 - Focused Penetration
Compromise Vulnerable Hosts (level 1)
[Exploit missing software patches]
[Deploy custom executable payloads]
[Acess remote management interfaces - RMI]
3 - Privilege Escalation
Estabilish Persistent Re-entry
Havest User Credentials
Pass Credentials to New Hosts(level 2)
[Identify privileged user accountd]
[Elevate to domain admin]
4 - Documentation
Gather Screenshots
Create Linear Attack Narratives
Create Final Deliverable
Enjoy @CyberTemple
Discover Network Hosts
Enumerate Listening Services
Discover Vulnerabilities
2 - Focused Penetration
Compromise Vulnerable Hosts (level 1)
[Exploit missing software patches]
[Deploy custom executable payloads]
[Acess remote management interfaces - RMI]
3 - Privilege Escalation
Estabilish Persistent Re-entry
Havest User Credentials
Pass Credentials to New Hosts(level 2)
[Identify privileged user accountd]
[Elevate to domain admin]
4 - Documentation
Gather Screenshots
Create Linear Attack Narratives
Create Final Deliverable
Enjoy @CyberTemple
🔞 US military contractor files and Puerto Rican reserve files leak.
Details: The two files are sets of documents regarding the US military reserve in Puerto Rico and of contractors that work with the military. These were both obtained in 2022 and these have been leaked in response to the atrocious acts that US has been involved in all these years without regard for human lives.
➡️Download links(updated V2):
https://anonfiles.com/b29eud70y1/USArmyReservePR.part2_rar
https://anonfiles.com/WdB2t971y6/USArmyReservePR.part1_rar
https://drive.google.com/file/d/1ClMiJBbDrBWJWsXF2edpaq6LA7VCzszt/view?usp=sharing
➡️Backup links:
https://bayfiles.com/b05cw473yb/USArmyReservePR.part1_rar
https://bayfiles.com/d9r9x57eyd/USArmyReservePR.part2_rar
https://upload.st/DdNbw77aye/USArmyReservePR.part1_rar
https://upload.st/ubffx773y5/USArmyReservePR.part2_rar
Details: The two files are sets of documents regarding the US military reserve in Puerto Rico and of contractors that work with the military. These were both obtained in 2022 and these have been leaked in response to the atrocious acts that US has been involved in all these years without regard for human lives.
➡️Download links(updated V2):
👏1