5 Tips to Protect Yourself from Cyberattacks at The University

0

Students often don’t see the importance of securing themselves in the cyber world because they do not perceive themselves as targets of hackers. The truth is, everybody is at risk and students can get their credit card information and other personal details used for fraudulent purposes.  That can completely change the lives of students and they may suffer from a...

Top 3 Best Ways to Track Someone by Cell Phone Number

0

There are many people who know quite well how to track someone by cell phone number, but there are some others who don’t have any slightest idea how it can be done. For the sake of your ease we are writing this article, so you would be able to choose the best way when it comes to tracking someone’s...

LOLBITS : C# Reverse Shell Using BITS As Communication Protocol

0

LOLBITS is a C# reverse shell that uses Microsoft's Background Intelligent Transfer Service (BITS) to communicate with the Command and Control backend. The Command and Control backend is hidden behind an apparently harmless flask web application and it's only accesible when the HTTP requests received by the app contain a valid authentication header. It is composed...

Shell Backdoor List : PHP / ASP Shell Backdoor List

0

Shell Backdoor is a malicious piece of code (e.g. PHP, Python, Ruby) that can be uploaded to a site to gain access to files stored on that site. Once it is uploaded, the hacker can use it to edit, delete, or download any files on the site, or upload their own. How to upload? Hackers usually take advantage...

Hakrawler : Discovery Of Endpoints & Assets Within A Web Application

0

Hakrawler is a Go web crawler designed for easy, quick discovery of endpoints and assets within a web application. It can be used to discover: FormsEndpointsSubdomainsRelated domainsJavaScript files The goal is to create the tool in a way that it can be easily chained with other tools such as subdomain enumeration tools and vulnerability scanners in order...

GTFO : Search For Unix Binaries To Bypass System Security Restrictions

0

GTFO is a tool used to search for Unix binaries that can be exploited to bypass system security restrictions. This is a standalone script written in Python 3 for GTFOBins. You can search for Unix binaries that can be exploited to bypass system security restrictions. These binaries can be abused to get the f**k break out of restricted shells, escalate...

SWFPFinder : SWF Potential Parameters Finder

0

SWFPFinder is a simple and open source bash script designed to discovery the potential swf (file) parameters on the webapp analysing the swf file. It use swfmill tool, swfmill is a tool to process Adobe Flash (SWF) files. It can convert SWF from and to an XML dialect called “swfml”, which is closely modeled after...

LaravelN00b : Automated Scan .env Files & Checking Debug Mode In Victim Host

0

Incorrect configuration allows you to access .env files or reading env variables. LaravelN00b automated scan .env files and checking debug mode in victim host. Scan Rationale Scan host.Resolve IP adress and check .env file in IP AdressChecking debug mode Laravel ( Read .env variables ) Also Read - IotShark : Monitoring And Analyzing IoT Traffic Installation Install with installer.sh chmod +x installer.sh...

Andriller : Software Utility With A Collection Of Forensic Tools For Smartphones

0

Andriller is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction...

Lava : Large-scale Automated Vulnerability Addition

0

Evaluating and improving bug-finding tools is currently difficult due to a shortage of ground truth corpora (i.e., software that has known bugs with triggering inputs). LAVA attempts to solve this problem by automatically injecting bugs into software. Every LAVA bug is accompanied by an input that triggers it whereas normal inputs are extremely unlikely to do so. These vulnerabilities...