کالبد شکافی رمزنگاری GSM و پروسه بروزرسانی مکان
https://payatu.com/dissecting-gsm-encryption-location-update-process/
#gsm
#mobile
#bts
https://payatu.com/dissecting-gsm-encryption-location-update-process/
#gsm
#mobile
#bts
Payatu
Dissecting GSM encryption and Location update process
This post is about gsm encryption and location update process. Learn how the mobile phone update it’s location to the mobile network.
خودکارسازی حملات فاز بر روی ورودی های سایت با استفاده از ماکروهای burp suite
https://blog.securelayer7.net/automating-web-apps-input-fuzzing-via-burp-macros/
#web
#pentest
#fuzzing
#burpsuite
#macro
https://blog.securelayer7.net/automating-web-apps-input-fuzzing-via-burp-macros/
#web
#pentest
#fuzzing
#burpsuite
#macro
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
Automating Web Apps Input fuzzing via Burp Macros
Hi Readers, This article is about Burp Suite Macros which helps us in automating efforts of manual input payload fuzzing. While it may be known to many testers, this article is written for those...
Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.
https://github.com/niloofarkheirkhah/nili
#network
#pentest
https://github.com/niloofarkheirkhah/nili
#network
#pentest
شبکه عصبی ساده با استفاده از پایتون و keras
https://www.pyimagesearch.com/2016/09/26/a-simple-neural-network-with-python-and-keras
#AI
#neuralNetwork
#machineLearning
#python
https://www.pyimagesearch.com/2016/09/26/a-simple-neural-network-with-python-and-keras
#AI
#neuralNetwork
#machineLearning
#python
PyImageSearch
A simple neural network with Python and Keras - PyImageSearch
Learn how to create a simple neural network using the Keras neural network and deep learning library along with the Python programming language.
Crack WPA/WPA2 WiFi Passwords With Wifiphisher by Jamming the WiFi
https://gbhackers.com/crack-wpawpa2-kali-linux-tutorial/
#wifi
#jammer
#crack
#wpa2
https://gbhackers.com/crack-wpawpa2-kali-linux-tutorial/
#wifi
#jammer
#crack
#wpa2
RemoteRecon
قابلیت های فعلی:
PowerShell
Screenshot
Token Impersonation
Inject ReflectiveDll (Must Export the ReflectiveLoader function from Stephen Fewer)
Inject Shellcode
Keylog
https://github.com/xorrior/RemoteRecon
قابلیت های فعلی:
PowerShell
Screenshot
Token Impersonation
Inject ReflectiveDll (Must Export the ReflectiveLoader function from Stephen Fewer)
Inject Shellcode
Keylog
https://github.com/xorrior/RemoteRecon
GitHub
GitHub - xorrior/RemoteRecon: Remote Recon and Collection
Remote Recon and Collection. Contribute to xorrior/RemoteRecon development by creating an account on GitHub.
Forwarded from vulners
Emergency: Apache Struts2 RCE S2-052 (CVE-2017-9805)
Security researchers have discovered a critical remote code execution vulnerability in the popular Apache Struts web application framework, allowing a remote attacker to run malicious code on the affected servers.
Apache Struts is a free, open-source, Model-View-Controller (MVC) framework for developing web applications in the Java programming language, which supports REST, AJAX, and JSON.
The vulnerability (CVE-2017-9805) is a programming blunder that resides in the way Struts processes data from an untrusted source. Specifically, Struts REST plugin fails to handle XML payloads while deserializing them properly.
All versions of Apache Struts since 2008 (from Struts 2.5 to Struts 2.5.12) are affected, leaving all web applications using the framework’s REST plugin vulnerable to remote attackers.
THN
Seebug
CVE-2017-9805
Metasploit Exploit
Security researchers have discovered a critical remote code execution vulnerability in the popular Apache Struts web application framework, allowing a remote attacker to run malicious code on the affected servers.
Apache Struts is a free, open-source, Model-View-Controller (MVC) framework for developing web applications in the Java programming language, which supports REST, AJAX, and JSON.
The vulnerability (CVE-2017-9805) is a programming blunder that resides in the way Struts processes data from an untrusted source. Specifically, Struts REST plugin fails to handle XML payloads while deserializing them properly.
All versions of Apache Struts since 2008 (from Struts 2.5 to Struts 2.5.12) are affected, leaving all web applications using the framework’s REST plugin vulnerable to remote attackers.
THN
Seebug
CVE-2017-9805
Metasploit Exploit
Google Mass Explorer (PYTHON 3.6)
روبات پایتونی سرچ گوگل با قابلیت جستجوی دورک
https://github.com/anarcoder/google_explorer
#python
#google
#hack
#dork
#web
#pentest
روبات پایتونی سرچ گوگل با قابلیت جستجوی دورک
https://github.com/anarcoder/google_explorer
#python
#hack
#dork
#web
#pentest
GitHub
GitHub - paralelo14/google_explorer: Mass exploitation tool in python
Mass exploitation tool in python. Contribute to paralelo14/google_explorer development by creating an account on GitHub.
راه اندازی سیستم احراز هویت دو مرحله ای (two FA) در لینوکس ابونتو
https://www.maketecheasier.com/setup-two-factor-authentication-ubuntu/
#linux
#2fa
#safety
https://www.maketecheasier.com/setup-two-factor-authentication-ubuntu/
#linux
#2fa
#safety
برنامه bugbounty در سایت uber و دسترسی به تمام سیستم های چت داخلی
https://blog.mish.re/index.php/2017/09/06/uber-bug-bounty-gaining-access-to-an-internal-chat-system/
#bugbounty
#web
#pentest
https://blog.mish.re/index.php/2017/09/06/uber-bug-bounty-gaining-access-to-an-internal-chat-system/
#bugbounty
#web
#pentest
https://pierrekim.github.io/advisories/z0-Owning_embedded_devices_and_network_protocols-redacted.pdf
تصاحب دستگاههای نهان و پروتکل های شبکه
#zerocon
#embededDevices
#network
تصاحب دستگاههای نهان و پروتکل های شبکه
#zerocon
#embededDevices
#network
تست آسیب پذیری Java Struts2 در ماشین مجازی
https://medium.com/metasploitable/play-with-java-struts2-rest-plugin-vulnerability-in-metasploitable-3-cve-2017-9805-6d5cf2b12aa9
#apache
#struts
#pentest
https://medium.com/metasploitable/play-with-java-struts2-rest-plugin-vulnerability-in-metasploitable-3-cve-2017-9805-6d5cf2b12aa9
#apache
#struts
#pentest
Medium
Play with Java Struts2 Rest Plugin Vulnerability in Metasploitable 3— CVE-2017–9805
Recently, a critical Remote Code Execution (RCE) vulnerability was discovered in the popular Apache Struts web application framework, which…