Sign in to follow this
Followers
0

Exploits Android Privilege Escalation
By
1337day-Exploits, in Updated Exploits
-
Similar Content
-
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. Coolmuster Android Assistant
As the professional Android managing software, Coolmuster Android Assistant offers you a one-stop solution to manage Android data easily.
* Back up and restore everything on Android device with 1 click.
* Selectively export or import one or more files from/to Android device.
* Add, transfer, delete and edit contacts on the computer.
* Send, resend, forward, delete and copy text messages directly on your Computer.
* Support to manage contacts, SMS, call logs, music, videos, photos, books, etc.
Supported OS:
Windows 11/10/8/7/Vista/XP
Hidden Content
Give reaction to this post to see the hidden content.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. A machine learning malware analysis framework for Android apps.
DroidDetective is a Python tool for analysing Android applications (APKs) for potential malware related behaviour and configurations. When provided with a path to an application (APK file) Droid Detective will make a prediction (using it's ML model) of if the application is malicious.
Features and qualities of Droid Detective include:
Analysing which of ~330 permissions are specified in the application's AndroidManifest.xml file.
Analysing the number of standard and proprietary permissions in use in the application's AndroidManifest.xml file.
Using a RandomForest machine learning classifier, trained off the above data, from ~14 malware families and ~100 Google Play Store applications.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. Here you will find privilege escalation tools for Windows and Linux/Unix* (in some near future also for Mac).
These tools search for possible local privilege escalation paths that you could exploit and print them to you with nice colors so you can recognize the misconfigurations easily.
Check the Local Windows Privilege Escalation checklist from book.hacktricks.xyz
WinPEAS – Windows local Privilege Escalation Awesome Script (C#.exe and .bat)
The goal of this project is to search for possible Privilege Escalation Paths in Windows environments.It should take only a few seconds to execute almost all the checks and some minutes searching in the whole main drive for known files that could contain passwords (the time depends on the number of files in your drive). Get rid of that time-consuming check using the parameter fast.By default, the program sleeps 150ms before start searching files in each directory. This is made to consume fewer resources (stealthier). You can avoid this sleep using searchfast parameter.The ouput will be colored. Below you have some indications about what does each color means exactly, but keep in mind that Red is for something interesting (from a pentester perspective) and Green is something good (from a defender perspective).The tool is heavily based in SeatBelt.IMPORTANT TO NOTICE: By default, WinPEAS will use colors for Windows terminals (without ANSI characters). If you are executing winpeas.exe from a reverse shell without any option any color will appear. To see colors in a Linux terminal you need to use the ANSI parameter.
Hidden Content
Give reaction to this post to see the hidden content.
-