Turn ranger into a full terminal malware triage & reverse engineering dock.
This is a heavily modified scope.sh preview script that transforms ranger into:
- Red Team Recon Dock
- Malware Research Quick Triage
- Threat Intel IOC Extractor
CVE-2025-32463 is a critical local privilege escalation vulnerability in the Sudo utility, affecting versions 1.9.14 to 1.9.17. With a CVSS score of 9.3, this flaw allows an unprivileged local user to execute arbitrary code as root by exploiting improper path resolution in Sudo’s --chroot (-R) option. Discovered by Qualys’ Threat Research Unit, the vulnerability stems from Sudo’s handling of the /etc/nsswitch.conf file within a user-controlled chroot environment, enabling the loading of a malicious shared library. This analysis details the vulnerability’s mechanics, exploitation process, impact, and mitigation strategies.
/etc/nsswitch.conf (e.g., Ubuntu, Debian, SUSE, Red Hat)--chroot option, added in Sudo 1.9.14 to enhance containerized environment supportpackage main
import (
"encoding/json"
"flag"
"fmt"
"io/ioutil"
"net/http"
"os"(function () {
const suspiciousSources = [
'location',
'location.href',
'location.search',
'document.URL',
'document.documentURI',
'document.referrer'
];(async function () {
const delay = ms => new Promise(resolve => setTimeout(resolve, ms));
const clickMuteButton = async () => {
const replies = document.querySelectorAll('[data-testid="tweet"]');
for (const reply of replies) {
const blueCheck = reply.querySelector('svg[aria-label="Verified account"]');
if (blueCheck) {
const moreOptionsButton = reply.querySelector('[aria-label="More"]');
if (moreOptionsButton) {This script is a Go-based website crawler designed to detect potential vulnerabilities to clickjacking attacks. It works by examining HTTP headers such as X-Frame-Options and Content-Security-Policy.
X-Frame-Options header.Content-Security-Policy directives for frame-ancestors to evaluate iframe embedding restrictions.X-Frame-Options or CSP frame-ancestors).| const startDate = new Date('2022-01-01'); | |
| const endDate = new Date('2023-01-01'); | |
| const waitForElemToExist = async (selector, timeout = 5000) => { | |
| return new Promise((resolve) => { | |
| const element = document.querySelector(selector); | |
| if (element) return resolve(element); | |
| const observer = new MutationObserver(() => { | |
| const element = document.querySelector(selector); |
Date: August 13, 2024
Pentester: Eno Leriand
#!/bin/bash
# Variables
HOSTAPD_CONF="/tmp/evil_twin/hostapd.conf"
DNSMASQ_CONF="/tmp/evil_twin/dnsmasq.conf"
PHISHING_PAGE_DIR="/tmp/evil_twin/www"
PHISHING_PAGE="$PHISHING_PAGE_DIR/index.html"
CAPTURE_FILE="/tmp/evil_twin/capture.txt"
HOTSPOT_IP="192.168.20.1"