Hack with GitHub

@HackwithGithub

Initiative to showcase open source hacking tools for hackers and pentesters.

Vrijeme pridruživanja: veljača 2016.

Tweetovi

Blokirali ste korisnika/cu @HackwithGithub

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @HackwithGithub

  1. proslijedio/la je Tweet
    31. sij

    Wow! "Resources for Beginner Bug Bounty Hunters" has over 1000 stars on GitHub now and we just pushed a new update! Check it out:

    Poništi
  2. 30. sij
    Poništi
  3. proslijedio/la je Tweet
    26. sij

    I'm teaching myself some automation with Chef. I wrote my first cookbook today 🎊. I'll add some code as I go on GitHub if people are interested =>

    Poništi
  4. proslijedio/la je Tweet
    25. sij

    I wrote some automation around gophish, evilginx2, and postfix for faster phishing deployment. Looking for feedback and pull requests :D

    Poništi
  5. proslijedio/la je Tweet
    26. sij
    Poništi
  6. proslijedio/la je Tweet
    24. sij

    Hello, guys! Finally, I have released new 3 tools for and for macOS. Please try them and have a nice weekend :) 1st tool: Norimaci is malware analysis sandbox for macOS. This tool was inspired Noriben sandbox. (1/3)

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    24. sij

    A collection of UNIX hacking tips & tricks curated by THC

    Poništi
  8. 23. sij
    Poništi
  9. proslijedio/la je Tweet
    21. sij
    Odgovor korisniku/ci

    For universal unpacking, I see some light at the end of tunnel with these projects based on : * *

    Poništi
  10. proslijedio/la je Tweet
    21. sij

    I just realized Desharialize, a tool to easily and dynamically exploit CVE-2019-0604 (SharePoint CVE). The reason to make it: - Use your own command (Public POCs contain hardcoded webshell commands - not clean for legit pentesting, or requires dotnet)

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    20. sij

    Happy to announce that you now can find the lecture notes for my Hardware and Embedded Systems Security course online, including tex sources:

    Poništi
  12. proslijedio/la je Tweet
    18. sij

    Very helpful design principles for zero-trust network architectures (aka BeyondCorp, BeyondProd) from UK :

    Poništi
  13. proslijedio/la je Tweet
    17. sij

    I spent some time learning about blockdlls and parent process spoofing from and . Using a recent sample from SubTee, I modified it to spoof the parent process and inject x64 shellcode from a dll on UNC into hidden iexplore.exe.

    Poništi
  14. 16. sij
    Poništi
  15. proslijedio/la je Tweet

    Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories, installed services, the registry and running drivers for the presence of known defensive such as AV's, EDR's.

    Poništi
  16. proslijedio/la je Tweet
    14. sij

    PSA: just got even faster on 0.6.5. Especially if you are running it under windows (3x increase for `evtx_dump`)! Linux is also faster by 30-40%!

    Poništi
  17. proslijedio/la je Tweet
    13. sij

    Want Free💰? Jump on the Citrix wagon! Pick a program on git clone cd check-cve-2019-19781 pip3 install -r requirements.txt cat hosts.txt | while read url ; do cve-2019-19781 ;done > loot.txt 2>&1 cat loot.txt | grep appear

    Poništi
  18. proslijedio/la je Tweet
    13. sij

    This is clever: find an unlocked Windows computer, pop in a USB and it shows a fake login/lock screen ("hmm, did I lock my PC when I went for a coffee?") User enters credentials into *your* app & you just stole the username/password. 🤯

    Poništi
  19. proslijedio/la je Tweet
    10. sij

    Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges (binaries + writeups by hacking topics)

    Poništi
  20. proslijedio/la je Tweet
    11. sij

    We have just released a new tool for exploiting CVE-2019-19781. Our goal was to keep private as long as possible to have a longer window to fix. Other researchers have published the exploit code in the wild already. Cats out of the bag.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·