Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'modular'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 7 results

  1. Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP, JSP and ASPX) and is core is developed in Python. Kraken follows the principle of "avoiding command execution" by re-implementing it through the functionalities of the programming language in use. Kraken seeks to provide usability, scalability and improve the OPSEC of ongoing operations. Although its main use is focused on offensive purposes (e.g. red teams, internal pentest), it is possible to use it by blue teams to evaluate existing defensive tools and configurations. [hide][Hidden Content]]
  2. Thunderstorm is a modular framework to exploit UPS devices. For now, only the CS-141 and NetMan 204 exploits will be available. The beta version of the framework will be released on the future. CVE Thunderstorm is currently capable of exploiting the following CVE: CVE-2022-47186 – Unrestricted file Upload # [CS-141] CVE-2022-47187 – Cross-Site Scripting via File upload # [CS-141] CVE-2022-47188 – Arbitrary local file read via file upload # [CS-141] CVE-2022-47189 – Denial of Service via file upload # [CS-141] CVE-2022-47190 – Remote Code Execution via file upload # [CS-141] CVE-2022-47191 – Privilege Escalation via file upload # [CS-141] CVE-2022-47192 – Admin password reset via file upload # [CS-141] CVE-2022-47891 – Admin password reset # [NetMan 204] CVE-2022-47892 – Sensitive Information Disclosure # [NetMan 204] CVE-2022-47893 – Remote Code Execution via file upload # [NetMan 204] [hide][Hidden Content]]
  3. Modular visual interface for GDB in Python. This comes as a standalone single-file .gdbinit which, among the other things, enables a configurable dashboard showing the most relevant information during the program execution. Its main goal is to reduce the number of GDB commands issued to inspect the current program status allowing the programmer to focus on the control flow instead. Features Single GDB init file. Write the dashboard to the main GDB console or to an external file/TTY. Interaction with GDB using the native Python API. Several default modules are included to address the most basic needs: source code, assembly, registers, etc.). User-defined modules can be easily developed by extending a Python class. Additional configuration files (both GDB and Python) are read from ~/.gdbinit.d/. Fully stylable user interface and dynamic command prompt. Optional syntax highlighting using the Pygments Python library. No GDB command has been redefined, instead, all the features are available as subcommands of the main dashboard command. [hide][Hidden Content]]
  4. Narthex (Greek: Νάρθηξ, νάρθηκας) is a modular & minimal dictionary generator for Unix and Unix-like operating system written in C and Shell. It contains autonomous Unix-style programs for the creation of personalised dictionaries that can be used for password recovery & security assessment. The programs make use of Unix text streams for collaboration with each other, according to the Unix philosophy. It is licensed under GPL v3.0. Currently under development! The tools nchance – A capitalization tool that appends the results to the bottom of the dictionary. ninc – A incrementation tool that multiplies alphabetical lines and appends an n++ at the end of each line. ncom – A combination tool that creates different combinations between the existing lines of the dictionary. nrev – A reversing tool, that appends the reserved versions of the lines at the end of the dictionary. nleet – A leetifier. Replaces characters with Leet equivalents, such as @ instead of a, or 3 instead of e. nclean – A tool for removing passwords that don’t meet your criteria (too short, no special characters, etc.) napp – A tool that appends characters or words before or after the lines of the dictionary. nwiz – A wizard that asks for the infromation and combines the tools together to create a final dictionary. Changelog v1.2 Updated delimiter functionality of ncom and added it to ninc too. Fixed a security vulnerability. Filename can be given as an argument in ncom. [hide][Hidden Content]]
  5. The PyIris project is a modular, stealthy and flexible remote-access-toolkit written completely in python. It allows users to dynamically build, generate, and encode/encrypt remote-access-trojan payloads for remote control of other compromised hosts. Features (Both Windows and Linux) Tab completion for most commands Dynamically generate scouts Robust error handling to allow scouts to recover from sudden disconnects Upload and download files from and to the target machine Sleep, kill and disconnect scouts Download files from external urls (web downloads) Keylogging in memory Displaying system information Taking screenshots without writing to disk See all currently open visible and nonvisible windows on the target Check to see if a scout is running with admin/root privileges Inject keystrokes Compile payloads into Windows EXEs or Linux ELFs Clear, set, or dump clipboard data Setting audio Take pictures from the webcam without writing to disk Stackable encryption of scout payload source code, in a theoretically infinite stack in infinite variations execute arbitrary python code and read the results even if the python interpreter is not installed on the target machine from compiled scouts request for admin/root sleep for an arbitrary length of time before running (To bypass AV dynamic program analysis) self-delete (only works for scripts) Stream webcam over TCP sockets (pretty laggy will work on a UDP version) Features (Windows) Archive persistence through the windows registry (HKEY_CURRENT_USER) Archive persistence through the windows startup folder Remote Command Execution through cmd.exe or powershell.exe (provided it is not blocked) Open URLs from a native browser (internet explorer ewww) Shutdown, restart, lock, logoff user gracefully without connection hanging from scout payload Execute or open files remotely Check the user idle time Dump saved chrome passwords (won’t work with the latest Chrome browsers since they changed encryption methods and I’m kinda lazy to update this lol) Disbale/ Enable the targets keyboard/mouse Bypass UAC through sdclt.exe (Has already been patched in recent windows updates) Features (Linux) Achieve persistence through cron jobs (crontab) Remote Command Execution through the bash shell [hide][Hidden Content]]
  6. Intel Modular Server System version 10.18 cross site request forgery change administrative password exploit. View the full article
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.