- 0
5 answers to this question
Recommended Posts

This topic is now closed to further replies.
Sign in to follow this
Followers
0
-
Similar Content
-
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. Web 2.0 Directory plugin provides an ability to build any kind of business directory site: classifieds, events directory, cars, bikes, boats and other vehicles dealers site, pets, real estate portal, wedding site, yellow pages. In other words – whatever you want.
Hidden Content
Give reaction to this post to see the hidden content.
Hidden Content
Give reaction to this post to see the hidden content. -
By dEEpEst
WINDOWS 10 DIGITAL LICENCE GENERATOR 2.0
Follow The Instructions
1).ᴜsᴇ ᴘᴏᴡᴇʀɪsᴏ sᴏғᴛᴡᴀʀᴇ ᴛᴏ ᴏᴘᴇɴ ʏᴏᴜʀ ᴡɪɴᴅᴏᴡs 10 ɪsᴏ.
2).ɴᴏᴡ ᴄᴏᴘʏ ᴛʜᴇ $ᴏᴇᴍ$ ғᴏʟᴅᴇʀ ғʀᴏᴍ ʜᴇʀᴇ ᴀɴᴅ ᴘᴀsᴛᴇ ɪᴛ ɪɴ sᴏᴜʀᴄᴇs
ғᴏʟᴅᴇʀ ᴏғ ᴛʜᴇ ɪsᴏ. ᴛʜᴇ ᴅɪʀᴇᴄᴛᴏʀʏ ᴡɪʟʟ ᴀᴘᴘᴇᴀʀ ʟɪᴋᴇ ᴛʜɪs
ɪsᴏ:\sᴏᴜʀᴄᴇs\$ᴏᴇᴍ$\
3).ɴᴏᴡ ᴄʟɪᴄᴋ ᴛʜᴇ ᴏᴘᴛɪᴏɴ sᴀᴠᴇ ᴀs ɪɴ ᴘᴏᴡᴇʀɪsᴏ.
4).ᴜsᴇ ᴛʜᴇ sᴀᴠᴇᴅ ɪsᴏ ᴛᴏ ɪɴsᴛᴀʟʟ ᴛʜᴇ ᴡɪɴᴅᴏᴡs.
5).ᴀʟʟ ᴅᴏɴᴇ. ᴇɴᴊᴏʏ!!
ᴏʀ
(1).ᴏᴘᴇɴ ᴛʜᴇ ᴘʀᴏɢʀᴀᴍ
(2).sᴇʟᴇᴄᴛ ᴏᴘᴛɪᴏɴ 1
(3).ʏᴏᴜ'ʀᴇ ᴅᴏɴᴇ
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. Security Onion
Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!
Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack.
Core Components
Logstash – Parse and format logs.
Elasticsearch – Ingest and index logs.
Kibana – Visualize ingested log data.
Auxiliary Components
Curator – Manage indices through scheduled maintenance.
ElastAlert – Query Elasticsearch and alert on user-defined anomalous behavior or other interesting bits of information.
FreqServer -Detect DGAs and find random file names, script names, process names, service names, workstation names, TLS certificate subjects and issuer subjects, etc.
DomainStats – Get additional info about a domain by providing additional context, such as creation time, age, reputation, etc.
Changelog v2.0 RC1
Re-branded 2.0 to give it a fresh look
All documentation has moved to our docs site
soup is alive! Note: This tool only updates Security Onion components. Please use the built-in OS update process to keep the OS and other components up to date.
so-import-pcap is back! See the so-import-pcap docs here.
Fixed issue with so-features-enable
Users can now pivot to PCAP from Suricata alerts
ISO install now prompts users to create an admin/sudo user instead of using a default account name
The web email & password set during setup is now used to create the initial accounts for TheHive, Cortex, and Fleet
Fixed issue with disk cleanup
Changed the default permissions for /opt/so to keep non-priviledged users from accessing salt and related files
Locked down access to certain SSL keys
Suricata logs now compress after they roll over
Users can now easily customize shard counts per index
Improved Elastic ingest parsers including Windows event logs and Sysmon logs shipped with WinLogbeat and Osquery (ECS)
Elastic nodes are now “hot” by default, making it easier to add a warm node later
so-allow now runs at the end of an install so users can enable access right away
Alert severities across Wazuh, Suricata and Playbook (Sigma) have been standardized and copied to event.severity:
1-Low / 2-Medium / 3-High / 4-Critical
Initial implementation of alerting queues:
Low & Medium alerts are accessible through Kibana & Hunt
High & Critical alerts are accessible through Kibana, Hunt and sent to TheHive for immediate analysis
ATT&CK Navigator is now a statically-hosted site in the nginx container
Playbook
All Sigma rules in the community repo (500+) are now imported and kept up to date
Initial implementation of automated testing when a Play’s detection logic has been edited (i.e., Unit Testing)
Updated UI Theme
Once authenticated through SOC, users can now access Playbook with analyst permissions without login
Kolide Launcher has been updated to include the ability to pass arbitrary flags – new functionality sponsored by SOS
Fixed issue with Wazuh authd registration service port not being correctly exposed
Added option for exposure of Elasticsearch REST API (port 9200) to so-allow for easier external querying/integration with other tools
Added option to so-allow for external Strelka file uploads (e.g., via strelka-fileshot)
Added default YARA rules for Strelka – default rules are maintained by Florian Roth and pulled from https://github.com/Neo23x0/signature-base
Added the ability to use custom Zeek scripts
Renamed “master server” to “manager node”
Improved unification of Zeek and Strelka file data
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. amber is a reflective PE packer for bypassing security products and mitigations. It can pack regularly compiled PE files into reflective payloads that can load and execute itself like a shellcode. It enables stealthy in-memory payload deployment that can be used to bypass anti-virus, firewall, IDS, IPS products and application white-listing mitigations. If you want to learn more about the packing methodology used inside amber check out below.
New Features
x64 support added !
Support for MacOS and Windows (Currently supporting all major platforms)
Assembly stubs rewritten
External dependencies reduced to two
C++ stubs converted to go
All project converted into a go package
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. TECHNIQUE
When victim enter his credentials, you need to go to original website and use those credentials to send real OTP to victim. Once he enter that OTP such OTP will also be there with you and you will be allowed to login the account before him.
AVAILABLE TUNNELLING OPTIONS
LOCALHOST
NGROK (https://ngrok.com/)
TESTED ON FOLLOWING:-
Kali Linux - 2020.1a (version)
Parrot OS - Rolling Edition (version)
Ubuntu - 18.04 (version)
Arch Linux
Termux App
Advance Phishing Tool 2.0
Add 16 New Phishing Pages with Latest Version
Fix Ngrok Problem
Add World First Tiktok Phishing Page
Hidden Content
Give reaction to this post to see the hidden content.
-
i need help pleese MESSAGE: Execute failed: (1364) Field 'cookie' doesn't have a default value
ERROR:
Share this post
Link to post
Share on other sites