LEGIT SHOPS 4 TOOLS / SERVICES
⚡️⚡️⚡️⚡️⚡️⚡️⚡️⚡️
LOGS:
https://xleet.pw/ ( Tools / Accounts/ Rdps/ Cpanel etc )
https://strongtools.ga ( Tools, Webmail etc )
https://olux.to ( Cpanels etc.. )
PROXIES:
faceless.cc ( Proxies )
https://www.aceproxies.com ( Proxies )
Piaproxy.com ( Pia Proxies )
USEFULLY:
https://scanlab.cc ( Fake IDs / edits )
Clearoutphone.io ( Phone Leads )
Njal.la ( Buy site Domain )
https://3389rdp.com ( RDPs )
https://freshtools.net/ ( Cpanels / Rdp etc )
https://floodcrm.cc/floodcrm.net ( Email/Call Flooding service )
Frappo.io ( Spamming FUD pages )
Strox.su (Spamming FUD / Bulletproof Cpanel )
https://Crazyrdp.com - [RDP logins]
https://Monovm.com/ - [RDP Logins]
https://Just-kill.cc ( Flooding Service etc.. )
SHARE TO EVERYONE TO HELP
⚡️⚡️⚡️⚡️⚡️⚡️⚡️⚡️
⚡️⚡️⚡️⚡️⚡️⚡️⚡️⚡️
LOGS:
https://xleet.pw/ ( Tools / Accounts/ Rdps/ Cpanel etc )
https://strongtools.ga ( Tools, Webmail etc )
https://olux.to ( Cpanels etc.. )
PROXIES:
faceless.cc ( Proxies )
https://www.aceproxies.com ( Proxies )
Piaproxy.com ( Pia Proxies )
USEFULLY:
https://scanlab.cc ( Fake IDs / edits )
Clearoutphone.io ( Phone Leads )
Njal.la ( Buy site Domain )
https://3389rdp.com ( RDPs )
https://freshtools.net/ ( Cpanels / Rdp etc )
https://floodcrm.cc/floodcrm.net ( Email/Call Flooding service )
Frappo.io ( Spamming FUD pages )
Strox.su (Spamming FUD / Bulletproof Cpanel )
https://Crazyrdp.com - [RDP logins]
https://Monovm.com/ - [RDP Logins]
https://Just-kill.cc ( Flooding Service etc.. )
SHARE TO EVERYONE TO HELP
⚡️⚡️⚡️⚡️⚡️⚡️⚡️⚡️
👍1
#labs
In this blogpost I tried to collect all InfoSec practical resources in one place, which I or my friends used to train. I will update this list periodically. If you found something missed, let me know 🙂
🌐 Web:
🔗 PortSwigger WebSecurity Academy - from zero to hero resource for web sec learning. Lots of articles and labs for each kind of web vulns. The only one resource you need to learn and practice web security.
💻 Infra:
🔗 TryHackMe - "hackthebox for beginners". (need subscription).
🔗 HackTheBox - a lot of hackable machines with different difficulty, OSes and vulnerabilities. Idea is to get the initial access and then escalate privileges. Also contains nice CTF challenges to practice in different fields.
🔗 CI/CD GOAT - self-hosted vulnerable CI/CD environment for practice CI/CD hacking with step-by-step writeups.
🪟Active Directory:
🔗 HackTheBox ProLabs - different Active Directory labs to practice exploitation, lateral movement, privilege escalation and more in complex game format. (need subscription).
🔗 GOAD - self-hosted AD lab with lots of vulnerabilities. Easy to deploy home lab for tools testing and exploitation practice (with step by step writeup).
🟦 Kubernetes:
🔗 EKS Cluster Games - AWS EKS (managed Kubernetes from AWS) exploration and exploitation challenge.
🔗 Kubernetes GOAT - self-hosted vulnerable kubernetes cluster with step-by-step guide to learn and practice Kubernetes security.
1️⃣0️⃣1️⃣ Binary exploitation:
🔗 LiveOverflow Binary Exploitation - youtube playlist with binary exploitation basics with tasks solutions. Better to start with it.
🔗 ropemporium - return-oriented programming practice challenges.
🔗 how2heap - lots of linux heap exploitation primitives mapped to glibc versions.
🔗 HEVD - HackSys Extreme Vulnerable Driver is vulnerable drivers for both Windows and Linux systems. You can exploit them by yourself or learn how to with provided exploits.
3️⃣ Web3:
🔗 ethernaut - Web3/Solidity based wargame with lots of vulnerable contracts you need to hack. WriteUps are easy to google.
🔑 Cryptography:
🔗 Cryptohack - lots of theory and practice tasks for math and modern crypto primitives and algorithms.
☁️ Cloud:
🔗 CloudGoat - Vulnerable by design AWS cloud-hosted infrastructure. Contains breath small walkthrough for each scenario.
🔗 AzureGoat - Vulnerable cloud-hosted Azure infrastructure contains web-vulns and cloud misconfigurations. Contains both attack and defense writeups.
🔗 flaws and flaws2 - Online AWS ctf-like security challenges without writeups. The second one also contains defensive part.
In this blogpost I tried to collect all InfoSec practical resources in one place, which I or my friends used to train. I will update this list periodically. If you found something missed, let me know 🙂
🌐 Web:
🔗 PortSwigger WebSecurity Academy - from zero to hero resource for web sec learning. Lots of articles and labs for each kind of web vulns. The only one resource you need to learn and practice web security.
💻 Infra:
🔗 TryHackMe - "hackthebox for beginners". (need subscription).
🔗 HackTheBox - a lot of hackable machines with different difficulty, OSes and vulnerabilities. Idea is to get the initial access and then escalate privileges. Also contains nice CTF challenges to practice in different fields.
🔗 CI/CD GOAT - self-hosted vulnerable CI/CD environment for practice CI/CD hacking with step-by-step writeups.
🪟Active Directory:
🔗 HackTheBox ProLabs - different Active Directory labs to practice exploitation, lateral movement, privilege escalation and more in complex game format. (need subscription).
🔗 GOAD - self-hosted AD lab with lots of vulnerabilities. Easy to deploy home lab for tools testing and exploitation practice (with step by step writeup).
🟦 Kubernetes:
🔗 EKS Cluster Games - AWS EKS (managed Kubernetes from AWS) exploration and exploitation challenge.
🔗 Kubernetes GOAT - self-hosted vulnerable kubernetes cluster with step-by-step guide to learn and practice Kubernetes security.
1️⃣0️⃣1️⃣ Binary exploitation:
🔗 LiveOverflow Binary Exploitation - youtube playlist with binary exploitation basics with tasks solutions. Better to start with it.
🔗 ropemporium - return-oriented programming practice challenges.
🔗 how2heap - lots of linux heap exploitation primitives mapped to glibc versions.
🔗 HEVD - HackSys Extreme Vulnerable Driver is vulnerable drivers for both Windows and Linux systems. You can exploit them by yourself or learn how to with provided exploits.
3️⃣ Web3:
🔗 ethernaut - Web3/Solidity based wargame with lots of vulnerable contracts you need to hack. WriteUps are easy to google.
🔑 Cryptography:
🔗 Cryptohack - lots of theory and practice tasks for math and modern crypto primitives and algorithms.
☁️ Cloud:
🔗 CloudGoat - Vulnerable by design AWS cloud-hosted infrastructure. Contains breath small walkthrough for each scenario.
🔗 AzureGoat - Vulnerable cloud-hosted Azure infrastructure contains web-vulns and cloud misconfigurations. Contains both attack and defense writeups.
🔗 flaws and flaws2 - Online AWS ctf-like security challenges without writeups. The second one also contains defensive part.
portswigger.net
Web Security Academy: Free Online Training from PortSwigger
The Web Security Academy is a free online training center for web application security, brought to you by PortSwigger. Create an account to get started.
🔥2
Что такое LFI/RFI(Включение локального файла/Удаленное включение файла)?
Удаленное включение файла: файл загружается с удаленного сервера
Включение локального файла: сервер загружает локальный файл
Уязвимость возникает, когда пользователь может каким-либо образом контролировать файл, который будет загружен сервером.
Уязвимые функции PHP:
Пример payload'a:
* Полный список Payload'ов есть в /usr/share/wordlists/... (Kali linux)
Вывод:
Удаленное включение файла: файл загружается с удаленного сервера
Включение локального файла: сервер загружает локальный файл
Уязвимость возникает, когда пользователь может каким-либо образом контролировать файл, который будет загружен сервером.
Уязвимые функции PHP:
require, require_once, include, include_once.
Пример payload'a:
https://codeby.ex/?data=../../../../etc/passwd* Полный список Payload'ов есть в /usr/share/wordlists/... (Kali linux)
Вывод:
Содержимое файла passwd👍1
->https://youtu.be/fZtWRzcmh0Y
->https://youtu.be/h_f9lB4i-LA
Видеоинструкции по созданию простейшего Geo/IP-логгера, а также получению удаленного доступа к камере и микрофону устройства.
#OSINT #LOGGER #HTML
->https://youtu.be/h_f9lB4i-LA
Видеоинструкции по созданию простейшего Geo/IP-логгера, а также получению удаленного доступа к камере и микрофону устройства.
#OSINT #LOGGER #HTML
👍1
https://www.youtube.com/watch?v=IJn6_PmXm7E
https://github.com/cornerpirate/JS2PDFInjector
#XSS #File_Upload
https://github.com/cornerpirate/JS2PDFInjector
#XSS #File_Upload
YouTube
BUG BOUNTY: FILE UPLOAD VULNERABILITIES VIA PDF FILES | 2023
Note: This video is only for educational purpose.
Hi everyone! In this video, you will learn how we can upload malicious pdf files to do cross site scripting
Website: https://bepractical.tech
Previous Video: https://www.youtube.com/watch?v=P1RG3hYz5xQ…
Hi everyone! In this video, you will learn how we can upload malicious pdf files to do cross site scripting
Website: https://bepractical.tech
Previous Video: https://www.youtube.com/watch?v=P1RG3hYz5xQ…
👍1
100 web vulnerabilities, categorized into various types:
Injection Vulnerabilities:
1. SQL Injection (SQLi)
2. Cross-Site Scripting (XSS)
3. Cross-Site Request Forgery (CSRF)
4. Remote Code Execution (RCE)
5. Command Injection
6. XML Injection
7. LDAP Injection
8. XPath Injection
9. HTML Injection
10. Server-Side Includes (SSI) Injection
11. OS Command Injection
12. Blind SQL Injection
13. Server-Side Template Injection (SSTI)
Broken Authentication and Session Management:
14. Session Fixation
15. Brute Force Attack
16. Session Hijacking
17. Password Cracking
18. Weak Password Storage
19. Insecure Authentication
20. Cookie Theft
21. Credential Reuse
Sensitive Data Exposure:
22. Inadequate Encryption
23. Insecure Direct Object References (IDOR)
24. Data Leakage
25. Unencrypted Data Storage
26. Missing Security Headers
27. Insecure File Handling
Security Misconfiguration:
28. Default Passwords
29. Directory Listing
30. Unprotected API Endpoints
31. Open Ports and Services
32. Improper Access Controls
33. Information Disclosure
34. Unpatched Software
35. Misconfigured CORS
36. HTTP Security Headers Misconfiguration
XML-Related Vulnerabilities:
37. XML External Entity (XXE) Injection
38. XML Entity Expansion (XEE)
39. XML Bomb
Broken Access Control:
40. Inadequate Authorization
41. Privilege Escalation
42. Insecure Direct Object References
43. Forceful Browsing
44. Missing Function-Level Access Control
Insecure Deserialization:
45. Remote Code Execution via Deserialization
46. Data Tampering
47. Object Injection
API Security Issues:
48. Insecure API Endpoints
49. API Key Exposure
50. Lack of Rate Limiting
51. Inadequate Input Validation
Insecure Communication:
52. Man-in-the-Middle (MITM) Attack
53. Insufficient Transport Layer Security
54. Insecure SSL/TLS Configuration
55. Insecure Communication Protocols
Client-Side Vulnerabilities:
56. DOM-based XSS
57. Insecure Cross-Origin Communication
58. Browser Cache Poisoning
59. Clickjacking
60. HTML5 Security Issues
Denial of Service (DoS):
61. Distributed Denial of Service (DDoS)
62. Application Layer DoS
63. Resource Exhaustion
64. Slowloris Attack
65. XML Denial of Service
Other Web Vulnerabilities:
66. Server-Side Request Forgery (SSRF)
67. HTTP Parameter Pollution (HPP)
68. Insecure Redirects and Forwards
69. File Inclusion Vulnerabilities
70. Security Header Bypass
71. Clickjacking
72. Inadequate Session Timeout
73. Insufficient Logging and Monitoring
74. Business Logic Vulnerabilities
75. API Abuse
Mobile Web Vulnerabilities:
76. Insecure Data Storage on Mobile Devices
77. Insecure Data Transmission on Mobile Devices
78. Insecure Mobile API Endpoints
79. Mobile App Reverse Engineering
IoT Web Vulnerabilities:
80. Insecure IoT Device Management
81. Weak Authentication on IoT Devices
82. IoT Device Vulnerabilities
Web of Things (WoT) Vulnerabilities:
83. Unauthorized Access to Smart Homes
84. IoT Data Privacy Issues
Authentication Bypass:
85. Insecure "Remember Me" Functionality
86. CAPTCHA Bypass
Server-Side Request Forgery (SSRF):
87. Blind SSRF
88. Time-Based Blind SSRF
Content Spoofing:
89. MIME Sniffing
90. X-Content-Type-Options Bypass
91. Content Security Policy (CSP) Bypass
Business Logic Flaws:
92. Inconsistent Validation
93. Race Conditions
94. Order Processing Vulnerabilities
95. Price Manipulation
96. Account Enumeration
97. User-Based Flaws
Zero-Day Vulnerabilities:
98. Unknown Vulnerabilities
99. Unpatched Vulnerabilities
100. Day-Zero Exploits
Injection Vulnerabilities:
1. SQL Injection (SQLi)
2. Cross-Site Scripting (XSS)
3. Cross-Site Request Forgery (CSRF)
4. Remote Code Execution (RCE)
5. Command Injection
6. XML Injection
7. LDAP Injection
8. XPath Injection
9. HTML Injection
10. Server-Side Includes (SSI) Injection
11. OS Command Injection
12. Blind SQL Injection
13. Server-Side Template Injection (SSTI)
Broken Authentication and Session Management:
14. Session Fixation
15. Brute Force Attack
16. Session Hijacking
17. Password Cracking
18. Weak Password Storage
19. Insecure Authentication
20. Cookie Theft
21. Credential Reuse
Sensitive Data Exposure:
22. Inadequate Encryption
23. Insecure Direct Object References (IDOR)
24. Data Leakage
25. Unencrypted Data Storage
26. Missing Security Headers
27. Insecure File Handling
Security Misconfiguration:
28. Default Passwords
29. Directory Listing
30. Unprotected API Endpoints
31. Open Ports and Services
32. Improper Access Controls
33. Information Disclosure
34. Unpatched Software
35. Misconfigured CORS
36. HTTP Security Headers Misconfiguration
XML-Related Vulnerabilities:
37. XML External Entity (XXE) Injection
38. XML Entity Expansion (XEE)
39. XML Bomb
Broken Access Control:
40. Inadequate Authorization
41. Privilege Escalation
42. Insecure Direct Object References
43. Forceful Browsing
44. Missing Function-Level Access Control
Insecure Deserialization:
45. Remote Code Execution via Deserialization
46. Data Tampering
47. Object Injection
API Security Issues:
48. Insecure API Endpoints
49. API Key Exposure
50. Lack of Rate Limiting
51. Inadequate Input Validation
Insecure Communication:
52. Man-in-the-Middle (MITM) Attack
53. Insufficient Transport Layer Security
54. Insecure SSL/TLS Configuration
55. Insecure Communication Protocols
Client-Side Vulnerabilities:
56. DOM-based XSS
57. Insecure Cross-Origin Communication
58. Browser Cache Poisoning
59. Clickjacking
60. HTML5 Security Issues
Denial of Service (DoS):
61. Distributed Denial of Service (DDoS)
62. Application Layer DoS
63. Resource Exhaustion
64. Slowloris Attack
65. XML Denial of Service
Other Web Vulnerabilities:
66. Server-Side Request Forgery (SSRF)
67. HTTP Parameter Pollution (HPP)
68. Insecure Redirects and Forwards
69. File Inclusion Vulnerabilities
70. Security Header Bypass
71. Clickjacking
72. Inadequate Session Timeout
73. Insufficient Logging and Monitoring
74. Business Logic Vulnerabilities
75. API Abuse
Mobile Web Vulnerabilities:
76. Insecure Data Storage on Mobile Devices
77. Insecure Data Transmission on Mobile Devices
78. Insecure Mobile API Endpoints
79. Mobile App Reverse Engineering
IoT Web Vulnerabilities:
80. Insecure IoT Device Management
81. Weak Authentication on IoT Devices
82. IoT Device Vulnerabilities
Web of Things (WoT) Vulnerabilities:
83. Unauthorized Access to Smart Homes
84. IoT Data Privacy Issues
Authentication Bypass:
85. Insecure "Remember Me" Functionality
86. CAPTCHA Bypass
Server-Side Request Forgery (SSRF):
87. Blind SSRF
88. Time-Based Blind SSRF
Content Spoofing:
89. MIME Sniffing
90. X-Content-Type-Options Bypass
91. Content Security Policy (CSP) Bypass
Business Logic Flaws:
92. Inconsistent Validation
93. Race Conditions
94. Order Processing Vulnerabilities
95. Price Manipulation
96. Account Enumeration
97. User-Based Flaws
Zero-Day Vulnerabilities:
98. Unknown Vulnerabilities
99. Unpatched Vulnerabilities
100. Day-Zero Exploits
👍1
Инструмент поиска по никнейму
Snoop – один из самых перспективных OSINT-инструментов по поиску никнеймов
Он обеспечивает выслеживание nickname на 3000 интернет-ресурсах
Подготовлены сборки для OS GNU/Linux, Windows и Termux (Android)
Программа поддерживает загрузку nickname из файла и добавляет промежуточную таблицу в cli-отчет
#Tools #OSINT
Snoop – один из самых перспективных OSINT-инструментов по поиску никнеймов
Он обеспечивает выслеживание nickname на 3000 интернет-ресурсах
Подготовлены сборки для OS GNU/Linux, Windows и Termux (Android)
Программа поддерживает загрузку nickname из файла и добавляет промежуточную таблицу в cli-отчет
#Tools #OSINT
👍1
Stored XSS/IFrame/HTMLi | Bug Bounty Poc
"><A HREF="https://example.com/">Login Here</A>
"><iframe src="https://example.com/">
"><script>prompt(document.cookie)</script>
#XSS
"><A HREF="https://example.com/">Login Here</A>
"><iframe src="https://example.com/">
"><script>prompt(document.cookie)</script>
#XSS
👍1
Crowdstrike сломал всем Windows https://www.wired.com/story/microsoft-windows-outage-crowdstrike-global-it-probems/
WIRED
Huge Microsoft Outage Caused by CrowdStrike Takes Down Computers Around the World
A software update from cybersecurity company CrowdStrike appears to have inadvertently disrupted IT systems globally.
👍1
#Hacktify | Nuclei for Pentesting & Bug Bounties
Info: https://hacktify.thinkific.com/courses/mastering-nuclei-for-pentesting-bug-bounties
Info: https://hacktify.thinkific.com/courses/mastering-nuclei-for-pentesting-bug-bounties
👍1
SecList for CyberStudents
Crowdstrike сломал всем Windows https://www.wired.com/story/microsoft-windows-outage-crowdstrike-global-it-probems/
How to fix the Crowdstrike thing:
1. Boot Windows into safe mode
2. Go to C:\Windows\System32\drivers\CrowdStrike
3. Delete C-00000291*.sys
4. Repeat for every host in your enterprise network including remote workers
5. If you're using BitLocker jump off a bridge
1. Boot Windows into safe mode
2. Go to C:\Windows\System32\drivers\CrowdStrike
3. Delete C-00000291*.sys
4. Repeat for every host in your enterprise network including remote workers
5. If you're using BitLocker jump off a bridge
👍1
1000$ IDOR : Unauthorized Project Inclusion in Expense
https://medium.com/@a13h1/1000-idor-unauthorized-project-inclusion-in-expense-b9ce08b28c71
https://medium.com/@a13h1/1000-idor-unauthorized-project-inclusion-in-expense-b9ce08b28c71
Medium
1000$ IDOR : Unauthorized Project Inclusion in Expense
Hi Everyone! Today, I’m excited to talk about a critical vulnerability I discovered in a platform (let’s call it ExamFit), which allowed…
👍1
📮JScripter - A noob-friendly JavaScript scraper based on #GAU and #hakrawler. Options to scan a single URL or multiple URLs from a list. Uses threads, saves files into a directory, and de-duplicates during saving.
✅Download-https://github.com/ifconfig-me/JScripter
#BugBounty #bugbountytips
✅Download-
#BugBounty #bugbountytips
👍1
🚀 Apepe - Mobile application pentesting🚀
🕵️ Apepe is a Python tool developed to help pentesters and red teamers to easily get information from the target app. This tool will extract basic informations as the package name, if the app is signed and the development language...
🧾 Source - github.com/oppsec/Apepe
🕵️ Apepe is a Python tool developed to help pentesters and red teamers to easily get information from the target app. This tool will extract basic informations as the package name, if the app is signed and the development language...
🧾 Source - github.com/oppsec/Apepe
👍1