Получи случайную криптовалюту за регистрацию!

HackGit

Логотип телеграм канала @hackgit — HackGit H
Логотип телеграм канала @hackgit — HackGit
Адрес канала: @hackgit
Категории: Софт, приложения
Язык: Русский
Количество подписчиков: 18.68K
Описание канала:

The channel was created for cybersecurity specialists.
• Offensive Security
• RedTeam
• Malware Research
• BugBounty
• OSINT
• etc
Disclaimer:
t.me/hackgit/2082
Donations - Ads:
t.me/hackgit/5423

Рейтинги и Отзывы

3.67

3 отзыва

Оценить канал hackgit и оставить отзыв — могут только зарегестрированные пользователи. Все отзывы проходят модерацию.

5 звезд

2

4 звезд

0

3 звезд

0

2 звезд

0

1 звезд

1


Последние сообщения 2

2022-08-31 17:17:00 ​​CVE-2022-1388

F5 BIG-IP RCE exploitation (CVE-2022-1388)

https://github.com/alt3kx/CVE-2022-1388_PoC

#cve #poc
451 views14:17
Открыть/Комментировать
2022-08-31 14:14:01 ​​PyExchangePasswordSpray

Microsoft Exchange password spraying tool with proxy capabilities.

Features:
Proxy List Support . HTTP & HTTPS
Set a delay between each password spray.
Use user & password list from a txt file
Multi-threading support

https://github.com/iomoath/PyExchangePasswordSpray
477 views11:14
Открыть/Комментировать
2022-08-31 14:14:00 ​​BlazingFast

DoS method (updated 2022)

The previous method I posted has been patched, this one has not been. You can modify this script or implement it in order to use bots to take down a BlazingFast VPS. BlazingFast is known for being a relatively good host, and with my own experience, has a good team.

BlazingFast protects all its virtual private servers with very good mitigation and detection methods, this script bypasses them by pretending to be a whitelisted crawling bot (BlazingFast use them to crawl servers for statistics such as avg heat, avg net use, etc) and succeeds in sending enough traffic to knock down a single server its aimed at.

https://github.com/0x44F/blazingfast-dos-updated
460 views11:14
Открыть/Комментировать
2022-08-31 13:13:01 ​​Ekko_CFG_Bypass

A PoC for adding NtContinue to the CFG allowed list in order to make callback-based sleep obfuscation techniques work in a CFG protected process.

Use the markCFGValid_std function to call SetProcessValidCallTargets and the markCFGValid_nt function to call NtSetInformationVirtualMemory.

https://github.com/IcebreakerSecurity/Ekko_CFG_Bypass

t.me/hackgit
455 views10:13
Открыть/Комментировать
2022-08-31 13:13:00 ​​The_spy_job

This Tool is focused on the OSINT of almost all areas (People, Nicknames, Social Networks, Emails, Phone Numbers, Websites, Public IPs and Images).

https://github.com/XDeadHackerX/The_spy_job

t.me/hackgit
434 views10:13
Открыть/Комментировать
2022-08-31 13:01:23 ​​WUD v1.2

The device has an ESP32-S2 module that allows it to be identified as a keyboard + USB disk. It also a microSD slot that can be identified as MSC SD Card.

The new ESP32-S2 module from Espressif addresses the security flaws in the original ESP32. While the ESP32-S2 does include improved security features, it lacks the Bluetooth capabilities of the original ESP32 module. But it supports native USB.

The pre-flashed firmware is "Wireless USB disk". It use ESP32-S2 as an USB Disk with Wireless accessibility. HTTP file server be used with both upload and download capability.

Firmware:
Source code of wireless usb disk - written in Arduino
usb_msc_wireless_disk from espressif
WUD-Ducky Thanks tobozo for his great projects

Buy online:
https://ali.ski/AJoiRH

#esp32s2 #usb #ducky
380 views10:01
Открыть/Комментировать
2022-08-31 11:11:01 ​​CVE-2022-24637

Exploit for the Unauthenticated RCE in Open Web Analytics (OWA) <1.7.4. This work is based on https://devel0pment.de/?p=2494.

https://github.com/JacobEbben/CVE-2022-24637

#cve #RCE
492 views08:11
Открыть/Комментировать
2022-08-31 11:11:00 ​​YongyouNC

UF NC deserialization vulnerability payload generation

https://github.com/Ghost2097221/YongyouNC-Unserialize-Tools

t.me/hackgit
467 views08:11
Открыть/Комментировать
2022-08-31 10:10:01 ​​SandboxBootkit

Bootkit tested on Windows Sandbox to patch ntoskrnl.exe and disable DSE/PatchGuard.

https://github.com/thesecretclub/SandboxBootkit

t.me/hackgit
471 views07:10
Открыть/Комментировать
2022-08-31 10:10:00 ​​Reinschauer

A PoC to remotely control Windows machines over Websockets.

Other than most HVNC implementations, reinschauer converts raw bitmaps to JPEG before sending data across the network to reduce frame size.
FPS can be set via the GUI.
Basic mouse and keyboard controls are possible.
You can use the script in the server folder to generate TLS server files or bring your own.
The server window can be resized freely, while click events should be translated to the correct pixel on the target machine.

https://github.com/ps1337/reinschauer

t.me/hackgit
467 views07:10
Открыть/Комментировать