- Metaspoit: Penetration testing software
- BeEF: The Browser Exploitation Framework
- PTF: Penetration Testers Framework
- Bettercap: MITM framework
- Nessus: Vulnerability scanner
- AutoNessus: Auto Nessus
- BDFProxy: Patch Binaries via MITM (BackdoorFactory)
- Xplico: Network Forensic Analysis Tool (eg. parse pcap file)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <!doctype html> | |
| <html> | |
| <head> | |
| <!-- | |
| Donation Address: 1NiNja1bUmhSoTXozBRBEtR8LeF9TGbZBN | |
| Notice of Copyrights and Licenses: | |
| *********************************** | |
| The bitaddress.org project, software and embedded resources are copyright bitaddress.org. | |
| The bitaddress.org name and logo are not part of the open source license. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #include <stdio.h> | |
| #include <stdlib.h> | |
| #include <stdint.h> | |
| #ifdef _MSC_VER | |
| #include <intrin.h> /* for rdtscp and clflush */ | |
| #pragma optimize("gt",on) | |
| #else | |
| #include <x86intrin.h> /* for rdtscp and clflush */ | |
| #endif |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <body> | |
| <style>pre { white-space: inherit }</style> | |
| <pre id="log"></pre> | |
| <div id="ports" style="visibility: hidden; height: 0; width: 0;"></div> | |
| <iframe src="about:blank" name="x" id="x" style="display: none;"></iframe> | |
| </body> | |
| <script> | |
| var electrum = { | |
| logbreak: function() { e = document.createElement('br'); document.getElementById('log').appendChild(e); }, | |
| log: function(s) { e = document.createElement('span'); e.innerText = s+" "; document.getElementById('log').appendChild(e); }, |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /* | |
| * (un)comment correct payload first (x86 or x64)! | |
| * | |
| * $ gcc cowroot.c -o cowroot -pthread | |
| * $ ./cowroot | |
| * DirtyCow root privilege escalation | |
| * Backing up /usr/bin/passwd.. to /tmp/bak | |
| * Size of binary: 57048 | |
| * Racing, this may take a while.. | |
| * /usr/bin/passwd overwritten |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # KEEP YOUR PRIVATE KEYS SAFE ! | |
| # Anyone who can read this file can spend your bitcoin. | |
| # | |
| # Format: | |
| # <Base58 encoded private key>[<whitespace>[<key createdAt>]] | |
| # | |
| # The Base58 encoded private keys are the same format as | |
| # produced by the Satoshi client/ sipa dumpprivkey utility. | |
| # | |
| # Key createdAt is in UTC format as specified by ISO 8601 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #petya #petrWrap | |
| Win32/Diskcoder.Petya.C | |
| Ransomware attack. | |
| Got new info? Email at isox@vulners.com | |
| *********** KILLSWITCH // PARTIAL? GOT PROOF - EMAIL! | |
| Looks like if you block C:\Windows\perfc.dat from writing/executing - stops #Petya. Is used for rundll32 import. | |
| https://twitter.com/HackingDave/status/879779361364357121 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| """Demonstrates how to construct and send raw Ethernet packets on the | |
| network. | |
| You probably need root privs to be able to bind to the network interface, | |
| e.g.: | |
| $ sudo python sendeth.py | |
| """ | |
| from socket import * |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import socket | |
| from struct import * | |
| s = socket.socket(socket.AF_INET, socket.SOCK_RAW, socket.IPPROTO_TCP) | |
| while True: | |
| pack = s.recvfrom(20000) | |
| #Get the single element from the tuple |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Copyright 2014 Chris Cohen | |
| # | |
| # This program is free software: you can redistribute it and/or modify | |
| # it under the terms of the GNU General Public License as published by | |
| # the Free Software Foundation, either version 3 of the License, or | |
| # (at your option) any later version. | |
| # | |
| # This program is distributed in the hope that it will be useful, | |
| # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
| # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |