Search the Community
Showing results for tags 'small'.
-
Motivation During the forensic analysis of a Windows machine, you may find the name of a deleted prefetch file. While its content may not be recoverable, the filename itself is often enough to find the full path of the executable for which the prefetch file was created. [hide][Hidden Content]]
-
- 4
-
- prefetch-hash-cracker
- v0.2.0
-
(and 5 more)
Tagged with:
-
A small reverse shell for Linux & Windows. Features Windows Usage: └ Shared Commands: !exit !upload <src> <dst> * uploads a file to the target !download <src> <dst> * downloads a file from the target !lfwd <localport> <remoteaddr> <remoteport> * local portforwarding (like ssh -L) !rfwd <remoteport> <localaddr> <localport> * remote portforwarding (like ssh -R) !lsfwd * lists active forwards !rmfwd <index> * removes forward by index !plugins * lists available plugins !plugin <plugin> * execute a plugin !spawn <port> * spawns another client on the specified port !shell * runs /bin/sh !runas <username> <password> <domain> * restart xc with the specified user !met <port> * connects to a x64/meterpreter/reverse_tcp listener └ OS Specific Commands: !powershell * starts powershell with AMSI Bypass !rc <port> * connects to a local bind shell and restarts this client over it !runasps <username> <password> <domain> * restart xc with the specified user using powershell !vulns * checks for common vulnerabilities Linux Usage: └ Shared Commands: !exit !upload <src> <dst> * uploads a file to the target !download <src> <dst> * downloads a file from the target !lfwd <localport> <remoteaddr> <remoteport> * local portforwarding (like ssh -L) !rfwd <remoteport> <localaddr> <localport> * remote portforwarding (like ssh -R) !lsfwd * lists active forwards !rmfwd <index> * removes forward by index !plugins * lists available plugins !plugin <plugin> * execute a plugin !spawn <port> * spawns another client on the specified port !shell * runs /bin/sh !runas <username> <password> <domain> * restart xc with the specified user !met <port> * connects to a x64/meterpreter/reverse_tcp listener └ OS Specific Commands: !ssh <port> * starts sshd with the configured keys on the specified port [hide][Hidden Content]]
-
Features Windows Usage: └ Shared Commands: !exit !upload <src> <dst> * uploads a file to the target !download <src> <dst> * downloads a file from the target !lfwd <localport> <remoteaddr> <remoteport> * local portforwarding (like ssh -L) !rfwd <remoteport> <localaddr> <localport> * remote portforwarding (like ssh -R) !lsfwd * lists active forwards !rmfwd <index> * removes forward by index !plugins * lists available plugins !plugin <plugin> * execute a plugin !spawn <port> * spawns another client on the specified port !shell * runs /bin/sh !runas <username> <password> <domain> * restart xc with the specified user !met <port> * connects to a x64/meterpreter/reverse_tcp listener └ OS Specific Commands: !powershell * starts powershell with AMSI Bypass !rc <port> * connects to a local bind shell and restarts this client over it !runasps <username> <password> <domain> * restart xc with the specified user using powershell !vulns * checks for common vulnerabilities Linux Usage: └ Shared Commands: !exit !upload <src> <dst> * uploads a file to the target !download <src> <dst> * downloads a file from the target !lfwd <localport> <remoteaddr> <remoteport> * local portforwarding (like ssh -L) !rfwd <remoteport> <localaddr> <localport> * remote portforwarding (like ssh -R) !lsfwd * lists active forwards !rmfwd <index> * removes forward by index !plugins * lists available plugins !plugin <plugin> * execute a plugin !spawn <port> * spawns another client on the specified port !shell * runs /bin/sh !runas <username> <password> <domain> * restart xc with the specified user !met <port> * connects to a x64/meterpreter/reverse_tcp listener └ OS Specific Commands: !ssh <port> * starts sshd with the configured keys on the specified port [hide][Hidden Content]]
-
About: Read Folder and File in server and can you edit file or change chmod of file or dir [HIDE][Hidden Content]]
-
- 9
-
- shell
- navir-shell
-
(and 3 more)
Tagged with:
-
Hi all, I was reading RFCs and am now wondering how to use the '*' wildcard char to send emails to all the users mailboxes of a given server with the IP I use IPs instead of domain names for efficiency and the domain name gets translated to IP anyways using DSN and the IP approche lets me get exhaustive list of IPs. Or coarse there are reserved/excluded IPs such as 127.0.0.1 (loopback). For example mail *@1.0.0.1 < email.txt => sends email.txt to all users of [Hidden Content] this approche has several advantages, first its exhaustive. don't need to input all domain names, second you don't get "mail undelivered" email messages bouncing back to mailbox for non existing users. third for stealth (using Tor or coarse) make you email untracable. The only thing the receiving end user sees is "*@*" in "From:" I have tried different approches for *@1.0.0.1 but the command fails even when using mutt, pine, etc any ideas ? thank's
-
UPDATE: Google AdWords has redesigned their user interface. The principles in this course are still very applicable, but you won't be able to follow the step-by-step portion of this course because the new interface looks very different. Learn how to create and manage profitable Google AdWords campaigns to get new customers and grow your small business’s bottom line. You will follow step-by-step guides to build your Google AdWords account and learn advanced tips from an agency pro who has managed millions of dollars in ad spend. Use Google AdWords to Grow Your Small Business and Make a Lot of Money Pick the right keywords Write ads that converts visitors into customers Get your ads higher and bigger than your competitors’ Use web and call tracking to know exactly how much money Google AdWords is making you Send people to the right pages on your website to increase your conversion rate Learn from a director at a top-rated Google Partner ad agency Google AdWords Can Be a Money Pit or a Profit-Generating Machine. Let's Build a Machine. Use Google AdWords to get people to your website who are searching for the products or services that you sell, at the exact moment that they are searching. Leads don't get hotter than that! You can show ads to people searching Google anywhere in the United States, (hey, the whole world!) or in a single zip code. John Horn is the director at an advertising agency that Google ranks in the top 5% of Google Partners worldwide for performance and customer care. He manages millions of dollars of ad spend for companies ranging from billion-dollar behemoths to tiny local businesses. If you want to use Google AdWords to make money, this course is right for you. This Course is NOT for: People training for Google's AdWords exams Large companies planning to spend $10,000s on AdWords This Course IS for: Small and medium businesses who want to make money using AdWords Who is this course for? This Google AdWords training course is meant for small businesses with little or no experience running Google AdWords. No prior experience with Google AdWords is needed. [Hidden Content]