❗️This is Educational Channel ❗️No Carding ❗️No Porn ❗️No Blackhat ❗️No illegal Activity ❗️We DoNot Support, Encourage & Promote Any illegal Activity All Post are Educational Puspose Only Contact: @CyberGenSupportBot
pwd - zer0day1ab
Metasploit Pro Update 2024071501
https://docs.rapid7.com/release-notes/metasploit/20240715/
Malcat (0.9.7 - 2024) binary analysis software | Windows & Ubuntu
Читать полностью…BUG BOUNTY COURSE 2024
Course Topics
:
Cybersecurity First Principles: A Reboot of Strategy and Tactics
2023
#cybersecurity #eng
🤍The Secrets of Nmap: Master Network Scanning and Hacking🤍
Become an expert at Nmap to discovery network vulnerabilities using Kali Linux and Wireshark!
1. Introduction
2. Networking Fundamentals
3. Legal Implications
4. Network Discovery
5. In-Depth Nmap Scan Options
6. Evading Firewalls & Intrusion Detection Systems (IDS)
7. Nmap Scripting Engine (NSE)I
8. Nmap Port Scanning & Scan Ordering
9. Output Formats
10. Zenmap & WebMap
Download :-
https://mega.nz/folder/xncmjQYT#zbqmRESdLqXGpcSNOONlmg
#nmap #wireshark #network #security
Posted by @WHITEHATHACKING47 👍
Kaspersky - Targeted Malware Reverse Engineering
Password - zero2024
RegreSSHion — OpenSSH Unauthenticated RCE
The Qualys Threat Research Unit has discovered a Remote Unauthenticated Code Execution vulnerability in OpenSSH’s server (sshd) in glibc-based Linux systems. CVE assigned to this vulnerability is CVE-2024-6387.
Research:
https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server
#openssh #glibc #rce #cve
🎥 #pentester_academy | USB Forensics and Pentesting
info = https://www.pentesteracademy.com/course?id=16
Recon Framework:- https://recon.madh.app
OSINT Framework:- https://osint.madh.app
⚡️ Website OSINT
Framework Link:-
Recon Framework: https://recon.madh.app
OSINT Framework: https://osint.madh.app
#osint #ethicalhacking #whitehathacking
@WHITEHATHACKER47👍
introduction Windows Malware Development
#freecourses
😨😨😨
🎭 PAID CARDING COURSE 🎭
🔋 Real Price - ₹5K
🔋 My Price - Always (₹0) Zero
#blackhat
📦 Share Us For More - @WHITEHATHACKER47 👍
🫥 Join for more
Burp Suite Professional v2024.6.3 + BurpBounty_Pro 2.8.0 + JDK 22
NOTE - Run this version With Java SE JDK 22
Acunetix Premium - v24.6.240626115
https://zerodaylab.cloud/darkside/web_scanner_Setup/38c37899e96f68be592196e578962573/acunetix_24.6.240626115.exe
Burp Suite Professional v2024.6.1 + BurpBounty_Pro 2.8.0 + JDK 22NOTE - Run this version With Java SE JDK 22
Released Friday, 5 July 2024
@WHITEHATHACKER47 #pentest #security
RockYou2024: 10 billion passwords leaked in the largest compilation of all time
Researchers discovered what appears to be the largest password compilation with a staggering 9,948,575,739 unique plaintext password
Source: https://cybernews.com/security/rockyou2024-largest-password-compilation-leak/
https://zerodaylab.cloud/storage/1fe295882920b5b23f4fe726e7b525da8166bde7/rockyou2024.zip
#reverseengineering #malware
👼@WHITEHATHACKER47😈
Binary Ninja 4.0.5336 (2024-05-27)
https://binary.ninja/js/hashes.js
Bruteratel Release v1.4 (Blitzkrieg)
https://bruteratel.com/release/2023/01/04/Release-Blitzkrieg/
🌹Ethical Hacking Masterclass🥀
Contains every single thing you need to know from zero level to advanced. It's very comprehensive.⭐️
Size: 56.1 GB❤️
Contains more than 500+ practical video
🔗 Link: https://drive.google.com/drive/folders/1mZwaNmPJB6OcGf-lSejIvbU8y2YxjDt4
#freecourses #ethicalhacking #cybersecurity
Posted by @WHITEHATHACKER47 👍
Burp Suite Professional v2024.5.3 + BurpBounty_Pro 2.8.0 + JDK 22
NOTE - Run this version With Java SE JDK 22
Released Tuesday, 18 June 2024
@WHITEHATHACKER47 #pentest #security
Scriptblock Smuggling... Или как прятать скрипт Powershell, чтобы он не мелькал в логах, и обходить AMSI без исправлений в памяти (патчей)
https://bc-security.org/scriptblock-smuggling/
#bypass #redteam #amsi #evasion
GrimResource - Microsoft Management Console for initial access and evasion
Elastic Security Labs has discovered a new method for initial access and evasion in the wild, termed GrimResource. It allows attackers to gain full code execution in the context of mmc.exe after a user clicks on a specially crafted MSC file.
Pop Calc POC: https://gist.github.com/joe-desimone/2b0bbee382c9bdfcac53f2349a379fa4