Jump to content

All Activity

This stream auto-updates

  1. Past hour
  2. Capture: Name / Account creation date / Artist [hide][Hidden Content]]
  3. Proxies: Yes Bots: 100 Email:Pass Capture: Name / Currency / Current Level / Pending / Total [hide][Hidden Content]]
  4. Accenture made a tool called Spartacus, which finds DLL hijacking opportunities on Windows. Using Spartacus as a starting point, we created Crassus to extend Windows privilege escalation finding capabilities beyond simply looking for missing files. The ACLs used by files and directories of privileged processes can find more than just looking for missing files to achieve the goal. Features Parsing ProcMon PML files natively. The log (PML) parser has been implemented by porting partial functionality to C# from [Hidden Content]. You can find the format specification here. Crassus will create source code for proxy DLLs for all missing DLLs that were identified. For instance, if an application is vulnerable to DLL Hijacking via version.dll, Crassus will create version.cpp and version.def files for you with all the exports included in it. By default, the proxy DLLs will launch calc.exe. Build scripts are included to build the DLLs on Visual Studio or MinGW. For other events of interest, such as creating a process or loading a library, the ability for unprivileged users to modify the file or any parts of the path to the file is investigated. Able to process large PML files and store all events of interest in an output CSV file. [hide][Hidden Content]]
  5. WAF bypass Tool is an open-source tool to analyze the security of any WAF for False Positives and False Negatives using predefined and customizable payloads. Check your WAF before an attacker does. WAF Bypass Tool is developed by the Nemesida WAF team with the participation of the community. Payloads Depending on the purpose, payloads are located in the appropriate folders: FP – False Positive payloads API – API testing payloads CM – Custom HTTP Method payloads GraphQL – GraphQL testing payloads LDAP – LDAP Injection etc. payloads LFI – Local File Include payloads MFD – multipart/form-data payloads NoSQLi – NoSQL injection payloads OR – Open Redirect payloads RCE – Remote Code Execution payloads RFI – Remote File Inclusion payloads SQLi – SQL injection payloads SSI – Server-Side Includes payloads SSRF – Server-side request forgery payloads SSTI – Server-Side Template Injection payloads UWA – Unwanted Access payloads XSS – Cross-Site Scripting payloads Write your own payloads When compiling a payload, the following zones, methods, and options are used: URL – request’s path ARGS – request’s query BODY – request’s body COOKIE – request’s cookie USER-AGENT – request’s user-agent REFERER – request’s referer HEADER – request’s header METHOD – request’s method BOUNDARY – specifies the contents of the request’s boundary. Applicable only to payloads in the MFD directory. ENCODE – specifies the type of payload encoding (Base64, HTML-ENTITY, UTF-16) in addition to the encoding for the payload. Multiple values are indicated with a space (e.g. Base64 UTF-16). Applicable only to for ARGS, BODY, COOKIE and HEADER zone. Not applicable to payloads in API and MFD directories. Not compatible with option JSON. JSON – specifies that the request’s body should be in JSON format BLOCKED – specifies that the request should be blocked (FN testing) or not (FP) [hide][Hidden Content]]
  6. [hide][Hidden Content]]
  7. [hide][Hidden Content]]
  8. [hide][Hidden Content]]
  9. Today
  10. x1 HBO | Expiry Date = 02-04-2023 | Auto-Renew = True [Hidden Content]
  11. Proxies: Yes Bots: 100 Email:Pass Capture: Balance / Points / Cart Count [hide][Hidden Content]]
  12. Proxies: Yes Bots: 100 Email:Pass Capture: Name / Points / Available Rewards [hide][Hidden Content]]
  13. Proxies: Yes Bots: 100 Email:Pass Capture: Name / Level / Gold / EXP / Country / Birth Date / Gender / Is User Banned / Is User VIP [hide][Hidden Content]]
  14. Yesterday
  15. x2 Disney Plus Yearly - ES - Web - 2021 | 2023-05-28 [Hidden Content]
  16. x2 McAfee LiveSafe (LenovoConsumer) | Product Expiry - 3/23/2024 [Hidden Content]
  17. x2 McAfee Total Protection | Product Expiry - 5/7/2024 [Hidden Content]
  18. A command-line productivity tool powered by OpenAI's ChatGPT (GPT-3.5). As developers, we can leverage ChatGPT capabilities to generate shell commands, code snippets, comments, and documentation, among other things. Forget about cheat sheets and notes, with this tool you can get accurate answers right in your terminal, and you'll probably find yourself reducing your daily Google searches, saving you valuable time and effort. [hide][Hidden Content]]
  19. Proxies: Yes Bots: 100 Email:Pass Capture: Name / Username / Phone Number / Membership Type / Registration Date [hide][Hidden Content]]
  20. Wing Python IDE was designed from the ground up for Python, for a more productive development experience. Get More Done Type less and let Wing worry about the details. Get immediate feedback by writing your Python code interactively in the live runtime. Easily navigate code and documentation. Write Better Code Avoid common errors and find problems early with assistance from Wing's deep Python code analysis. Keep code clean with smart refactoring and code quality inspection. Find Bugs Faster Debug any Python code. Inspect debug data and try out bug fixes interactively without restarting your app. Work locally or on a remote host, VM, or container. [Hidden Content] [hide][Hidden Content]]
  21. Last week
  22. Ajuste el nivel de seguridad del escritorio remoto RDS-Knight ofrece una funcionalidad avanzada y hace que el uso del acceso remoto en su rutina diaria sea lo más seguro posible. Cuando se trata de exponer el Protocolo de escritorio remoto a conexiones directas, necesita un servidor sólido y seguro para proteger sus sistemas contra los atacantes remotos. Debido a las técnicas innovadoras disponibles para los delincuentes cibernéticos modernos y una vulnerabilidad de uso después de la liberación en la solución de Microsoft, los piratas informáticos de todo el mundo pueden acceder fácilmente a las credenciales de inicio de sesión en cualquier lugar, realizar ataques de ransomware y ejecutar código arbitrario en el objetivo [Hidden Content] [hide][Hidden Content]]
  23. [hide][Hidden Content]]
  24. [hide][Hidden Content]]
  25. [hide][Hidden Content]]
  1. Load more activity

Chat Room

Chat Room

Chatroom Rules

No support in chat, open a thread.

  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.