BeEF

@beefproject

BeEF is pioneering techniques that provide practical client side attack vectors. Created & led by . Tweets by dev team.

Vrijeme pridruživanja: studeni 2010.

Tweetovi

Blokirali ste korisnika/cu @beefproject

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @beefproject

  1. proslijedio/la je Tweet
    17. pro 2019.

    Since several ppl are wondering how to get via : you have several solutions such like exploit or when you want to pwn quickly and don't have a working exploit against activeX/JS core etc.. I often just use , Linked to it's *awesome* and useful++

    Poništi
  2. proslijedio/la je Tweet
    13. pro 2019.

    from battlefield: Found Slack key and do not know what to do? Start instance (or any browser payload) and use to invite users to go on your link to get free gifts. Don't forget to spoof user+send message on every chan ;)

    Poništi
  3. proslijedio/la je Tweet
    14. ruj 2019.

    Learning how to use today. Cool stuff!

    Poništi
  4. proslijedio/la je Tweet

    Blind XSS on a backend system hooked with BEeF over HTTPS. is such an awesome tool. Thanks and others! <3

    Poništi
  5. proslijedio/la je Tweet
    2. tra 2019.

    Evolution of BeEF (Browser Exploitation Framework Project)

    Poništi
  6. proslijedio/la je Tweet
    28. ožu 2019.
    Poništi
  7. proslijedio/la je Tweet
    19. srp 2018.

    Day 4 in class at is almost 1/2 way done. It is my favorite day of XSS, XXE, and AJAX. Working with later after lunch. So much fun. So much impact! <script> alert(" ") </script>

    Poništi
  8. proslijedio/la je Tweet
    16. lip 2018.

    So, LuckyMouse used 's shikata_ga_nai to obfuscate the payload & to infect NDC. I thought shikata_ga_nai is detected by most AV's, I believe they tweaked it before using. It'd great anyone provide the malware sample.

    Poništi
  9. proslijedio/la je Tweet
    15. lip 2018.
    Poništi
  10. proslijedio/la je Tweet

    You know, instead of dropping silly cryptocurrency miners when bad actors hack websites, why do they not drop hooks?

    Poništi
  11. proslijedio/la je Tweet
    22. ožu 2018.
    Odgovor korisniku/ci

    Any traffic sent over unecrypted channels is vulnerable to manipulation. This could include injecting things such as spyware (ask Iran), cryptojacking or even hooks. Not mention if you have any login form, these could be changed to point to spoofed login forms.

    Poništi
  12. proslijedio/la je Tweet
    24. sij 2018.
    Poništi
  13. proslijedio/la je Tweet
    1. pro 2017.
    Poništi
  14. 22. stu 2017.

    CPU power come come to me! Thanks for integrating Crypto-Loot mining :D You rock as usual!

    Poništi
  15. proslijedio/la je Tweet
    1. stu 2017.

    Running in Docker thanks to ilyaglow:

    Poništi
  16. proslijedio/la je Tweet
    21. lis 2017.

    Most services take a cut - CoinHive is no different. Their cut is 30% as per their homepage.

    Poništi
  17. proslijedio/la je Tweet
    13. lis 2017.

    BeEF now supports Monero mining with Coinhive JavaScript Miner

    Poništi
  18. proslijedio/la je Tweet

    Interesting chart from September threat report. VBS / HTA is 100x more common than PowerShell. And they all drop EXEs anyways.

    Poništi
  19. proslijedio/la je Tweet
    23. srp 2017.
    Poništi
  20. proslijedio/la je Tweet
    14. srp 2017.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·