- Metaspoit: Penetration testing software
- GhostShell: Malware indetectable, with AV bypass techniques, anti-disassembly, etc.
- BeEF: The Browser Exploitation Framework
- PTF: Penetration Testers Framework
- Bettercap: MITM framework
- Nessus: Vulnerability scanner
- AutoNessus: Auto Nessus
- BDFProxy: Patch Binaries via MITM (BackdoorFactory)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Digging into a Facebook Worm | |
| http://i.imgur.com/zc2A8vJ.png | |
| Facebook worms are interesting | |
| The following was a link that was shared to me (You probably shouldn't click it) | |
| https://www.facebook.com/l.php?u=https%3A%2F%2Fcdn.fbsbx.com%2Fhphotos-xpa1%2Fv%2Ft59.2708-21%2F12447002_1746605272238633_1642381431_n.html%2FV1DE0-9682.html%3Foh%3D8a665fb34c8793a92fd02cceb31d4b01%26oe%3D5718116B%26dl%3D1&h=cAQHPcYE7 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /* Go to http://jsfiddle.net/5v5r8npk/ for drag & drop link marklets, easiest way to add to bookmarks! */ | |
| // BareBackRT.com | |
| javascript:var _='',$=document,whaks = document.getElementsByTagName("img");for (var i = 0, whak; whak = whaks[i]; i++) {_+='<img src="'+whak.src.replace(/\x26\x73\x3d/g,"&s=1")+'"> ';};$.body.innerHTML=_+'<hr>Visit <a href="http://www.whak.com">www.WHAK.com</a><hr>'+$.body.innerHTML;void 0; | |
| // Adam4Adam.com | |
| javascript:var $=document;$.body.innerHTML='<img src=%22'+large_img+'%22><hr>Visit <a href=%22http://www.whak.com%22>www.WHAK.com</a><hr>'+$.body.innerHTML;void 0; | |
| // Squirt.org | |
| javascript:var _='',$=document,whaks = document.getElementsByTagName(%22img%22);for (var i = 0, whak; whak = whaks[i]; i++) {_+='<img src=%22'+whak.src.replace(/\x26\x70\x73\x3d/g,%22&ps=1&%22)+'%22> ';};$.body.innerHTML=_+'<hr>Visit <a href=%22http://www.whak.com%22>www.WHAK.com</a><hr>'+$.body.innerHTML;void 0; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ### | |
| ### | |
| ### UPDATE: For Win 11, I recommend using this tool in place of this script: | |
| ### https://christitus.com/windows-tool/ | |
| ### https://github.com/ChrisTitusTech/winutil | |
| ### https://www.youtube.com/watch?v=6UQZ5oQg8XA | |
| ### iwr -useb https://christitus.com/win | iex | |
| ### | |
| ### OR take a look at | |
| ### https://github.com/HotCakeX/Harden-Windows-Security |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env ruby | |
| # apk_backdoor.rb | |
| # This script is a POC for injecting metasploit payloads on | |
| # arbitrary APKs. | |
| # Authored by timwr, Jack64 | |
| # | |
| require 'nokogiri' | |
| require 'fileutils' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| adb backup -f ./grindrapp.ab -noapk com.grindrapp.android | |
| java -jar ~/src/abe/build/libs/abe-all.jar unpack ./grindrapp.ab ./grindrapp.tar | |
| tar -xf grindrapp.tar | |
| open apps/com.grindrapp.android/db/grindr3.db |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| alias ls='ls --color=auto -F' | |
| alias grep='grep --color=auto' | |
| alias fgrep='fgrep --color=auto' | |
| alias egrep='egrep --color=auto' | |
| alias ll='ls -alF' | |
| alias la='ls -A' | |
| alias l='ls -CF' | |
| alias less="less -R " |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 23.21.150.121:3478 | |
| iphone-stun.strato-iphone.de:3478 | |
| numb.viagenie.ca:3478 | |
| s1.taraba.net:3478 | |
| s2.taraba.net:3478 | |
| stun.12connect.com:3478 | |
| stun.12voip.com:3478 | |
| stun.1und1.de:3478 | |
| stun.2talk.co.nz:3478 | |
| stun.2talk.com:3478 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 0trace 1.5 A hop enumeration tool http://jon.oberheide.org/0trace/ | |
| 3proxy 0.7.1.1 Tiny free proxy server. http://3proxy.ru/ | |
| 3proxy-win32 0.7.1.1 Tiny free proxy server. http://3proxy.ru/ | |
| 42zip 42 Recursive Zip archive bomb. http://blog.fefe.de/?ts=b6cea88d | |
| acccheck 0.2.1 A password dictionary attack tool that targets windows authentication via the SMB protocol. http://labs.portcullis.co.uk/tools/acccheck/ | |
| ace 1.10 Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface http://ucsniff.sourceforge.net/ace.html | |
| admid-pack 0.1 ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful. http://packetstormsecurity.com/files/10080/ADMid-pkg.tgz.html | |
| adminpagefinder 0.1 This python script looks for a large amount of possible administrative interfaces on a given site. http://packetstormse |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/data/data/com.termux/files/usr/bin/sh | |
| # sudo for Termux | |
| # For security reasons some environent variables are reset by su | |
| # So we need to set LD_LIBRARY_PATH | |
| # Root's HOME is set to 'termux's home/.suroot'. | |
| # Startup files and other stuffs can be added there. | |
| ROOT_HOME=$HOME/.suroot |