This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!
Cybercriminals using cookie theft infostealer malware continue to pose a risk to the safety and security of our users. We already have a number of initiatives in this area including Chrome’s download protection using Safe Browsing, Device Bound Session Credentials, and Google’s account-based...
Some tools to work with it
https://github.com/xaitax/TotalRecallhttps://github.com/xaitax/TotalRecall
Add Recall module for dumping all users Microsoft Recall DBs & screenshots by Marshall-Hallenbeck · Pull Request #335 · Pennyw0rth/NetExec
Gets all users Recall folders and dumps them, then...
I'm wondering how it's possible to download a lnk file without zipping, it always ends up as "*.download" file when I test. If anyone can help I will really appreciate it. This is the logic of the program:
A) Create a Javascript Blob object, holding file’s raw data
B) If operating on IE – use...
I am looking for somebody to automate the setup (one-liner or docker) and execution flow for a group of opensource projects. It is mostly powershell and python on linux vps. These programs are 90% working and practically made to fit together, but there are some bugs and I am not a coder. I know...
I should clarify. I see some guys that spam en mass from compromised boxes by hijacking a pre-existing conversation.
Here is an article explaining more: https://www.hornetsecurity.com/en/security-information/email-conversation-thread-hijacking/
I think they are using a script or maybe certain...
I am interested in ways to hijack a pre-existing email thread and add my attachment to a trusted conversation. I see many examples of people using this technique in the wild but can't find information on the forums (at least in English). If anybody can help with some reading material, in any...
Here is an interesting GitHub repo I found with many resources for somebody interested in learning about pentesting Azure.
GitHub - rootsecdev/Azure-Red-Team: Azure Security Resources and Notes
Azure Security Resources and Notes. Contribute to rootsecdev/Azure-Red-Team development by creating...
I'm writing this post to ask for some opinions on the different reverse proxy solutions such as evilginx2, modlishka etc. I'm not asking for a walkthrough, phishlets or "sauce", but rather which software do you believe has the most potential to customize, learn from and one day build a personal...
Check out:
https://github.com/kgretzky/evilginx2
The phishlets are pretty easy to make and theres quite a bit of documentation out there. I also posted a link to a video course in this thead:
https://xss.is/threads/42769/page-2#post-397640
about using this software along with other resources...
Use the port forwarding solution provided by 911. Theres a video guide on official site if you have trouble.
Basically ur PC acts as a middle hop between u n 911. Android to pc to 911proxy to destination.
Hope this helps
Here's a video course of pretty much what he just explained above. This is not my channel and I don't vouch for him in any way, I just remembered getting this a little while ago and thought it could help people here
Hacking Exploits in Hacker Chatroom
🚨Practical Phishing course🚨 🔥How to setup...