Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      1337day-Exploits

      Linux Insufficient Shootdown For Paging-Structure Caches

      Recommended Posts

      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. jSQL Injection is a lightweight application used to find database information from a distant server. It is free, open-source, and cross-platform (Windows, Linux, Mac OS X).
          It is also part of the official penetration testing distribution Kali Linux and is included in other distributions like Pentest Box, Parrot Security OS, ArchStrike, or BlackArch Linux.
          This software is developed using great open-source libraries like Spring, Spock, and Hibernate, and it uses the platform Travis CI for continuous integration.
          Each program update is tested with Java version 8 through 13 in the cloud, against various MySQL, PostgreSQL, and H2 databases. Source code is open to pull requests and to any contribution on multi-threading, devops, unit and integration tests, and optimization.
          Features
              Automatic injection of 23 kinds of databases: Access, CockroachDB, CUBRID, DB2, Derby, Firebird, H2, Hana, HSQLDB, Informix, Ingres, MaxDB, Mckoi, MySQL{MariaDb}, Neo4j, NuoDB, Oracle, PostgreSQL, SQLite, SQL Server, Sybase, Teradata and Vertica     Multiple injection strategies: Normal, Error, Blind and Time     SQL Engine to study and optimize SQL expressions     Injection of multiple targets     Search for administration pages     Creation and visualization of Web shell and SQL shell     Read and write files on the host using injection     Bruteforce of password’s hash     Code and decode a string Changelog jSQL Injection v0.85
              Compliance to Java 17
              Switch to native HttpClient

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. pyMalleableC2
          A Python interpreter for Cobalt Strike Malleable C2 profiles that allows you to parse, modify, build them programmatically and validate syntax.
          Supports all of the Cobalt Strike Malleable C2 Profile grammar starting from Cobalt Strike version 4.3.
          It’s not backwards compatible with previous Cobalt Strike releases.
          What are the differences between pyMalleableC2 and other projects of this nature?
              Parses profiles with Lark using eBNF notation. This approach is a lot more robust then user-defined regexes, templating engines, or similar methods.
              Turns profiles into an Abstract Syntax Tree (AST) which can then be reconstructed back into source code.
              Because of the above, pyMalleableC2 allows you to build profiles programmatically or modify them on the fly.
              Allows you to validate the syntax of Malleable C2 profiles (Does not perform runtime checks, see the warning below.)
              It has AI in the form of a lot of if statements.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Learn Reverse Engineering Using Ghidra On Linux And Windows
          What you'll learn
              Reverse Engineering
              Basics of Ghidra
              Solving Linux and Windows CrackMe's
              Understand Windows API's
              Identify Entry Points, Main and WinMain functions
              Analyzing using Function Graph and Function Call Trees
              Doing String Search and Defined Strings
              Windows API
              Function Call Graphs
              Creating Functions
              Converting data types
              Editing function signatures
              Cross referencing function calls and strings
              and more...
          Requirements
              Familiar with basic Linux Commands
              Some Basics of Assembly and C would be helpful but not strictly necessary
              Windows PC
          Description
          If you have never used Ghidra before and want to learn how get started with using Ghidra to reverse engineer and analyse programs, then this is the course for you.
          Ghidra is the strong competitor to IDA Pro and is used by NSA itself for Reverse Engineering. And the best thing is that it is totally free. It is used for Reverse Engineering, Malware Analysis and Exploits analysis. In this course we will learn Ghidra by solving  Linux  and Windows CrackMe challenges.  A CrackMe is a small program designed to test a programmer's reverse engineering skills. This course is an introduction to Reverse Engineering for anyone who wants to get started in this field. It is suitable for software developers who want to learn how software works internally and also for reverse engineers who want to understand how Linux  and Windows binaries work. This course will equip you with the knowledge and skill to use Ghidra in addition to whatever other tools you might already be familiar. It is also suitable for absolute beginners with no knowledge of reversing, as I will take you from zero to basics.
          I will start off with showing you how to install Oracle Virtual Box. Then, installing Java SDK and Kali Linux in the Virtual Box. Then, we will reverse engineer Linux executable files.
          Next, we will move on to installing Java SDK and Ghidra for Windows and reverse and analyze Windows programs. You will also learn how to reverse GUI CrackMe's. You will learn how to use Function Graphs, Function Call Trees, Search String, Defined Strings and more. The course will also cover how to identify program entry point and also find the main functions for command line interface apps and WinMain for GUI based apps.
          By the end of this course, you will have the basic skills to start reversing and analyzing Linux and Windows binaries.
          What you will learn:
              How to disassemble programs into assembly code
              How to decompile programs to C code
              Static Analysis
              Understand Windows API's
              Identify entry points, main and WinMain functions
              Use String Search and Defined Strings
              Visualizing the Call Stack using Function Graph and Function Call Trees
              Solving Crackmes
              and more ...
          Suitable for:
          Anyone interested to learn Reverse Engineering on Linux and Windows executable files.
          Who this course is for:
              Anyone interested to learn how to get started with Ghidra on Linux and Windows
              Those who have never used Ghidra before and want to learn the basics
              Students with some basic experience with other disassemblers
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Clean Version / itsMe!

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Mailster is an easy to use Email Newsletter Plugin for WordPress. Create, send and track your Newsletter Campaigns without hassle.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.