Skip to main content

Posts

Wordpress Exploit Framework

RedBird TO SUBSCRIBE WordPress Exploit FrameWork posted by  RedBird   July 09, 2017 WordPress Exploit FrameWork WPEF or WordPress Exploit FrameWork is a tool developed in ruby, which aims to develop or implement modules for web site penetration testing based on the WordPress CMS. Open a command line on your terminal in the directory you have downloaded WordPress Exploit Framework, and start it by running.  Ruby wpxf.rb Once loaded, you will be presented with the wpxf flag, from here you can search for modules using the search command or load a module using the use command . Uploading a module in your environment will allow you to set options with the setcommand and view information about the module using info . The following is an example of how you could load the symposium_shell_upload exploit module, set the module and payload options, and run the exploit against the target. [+] Loaded module: #<Wpxf::Exploit::SymposiumShellUpload:0x3916f20> wpxf [exploit/symposium_

wifislax

JuanDeLemos: wifislax64-1.0-final.iso LINK1 FTP OFICIAL: http://www.downloadwireless.net/isos/wifislax64-1.0-final.iso LINK2 MEDIAFIRE:  http://www.mediafire.com/file/25rsmyz449g2csc/wifislax64-1.0-final.iso LINK3 MEGA:    https://mega.nz/#!jsglSLxb!bZgdN7yeWvL2-xzPv7-15FOHf8FHnH6lWvCNogy2hTQ

Best Exploits list

Drok3r: Best Exploits phpMoAdmin Remote Code Execution (CVE-2015-2208) LotusCMS Remote Code Execution (OSVDB-75095) ElasticSearch Remote Code Execution (CVE-2015-1427) ShellShock (httpd) Remote Code Execution (CVE-2014-6271) IISlap - http.sys Denial of Service/RCE PoC (DoS only). (MS-15-034) se0wned - Seowintech Router diagnostic.cgi remote root WPsh0pwn - Wordpress WPShop eCommerce Shell Upload (WPVDB-7830) nmediapwn - Wordpress N-Media Website Contact Form with File Upload 1.3.4 Shell Upload pwnflow - Wordpress Work the flow file upload 2.5.2 Shell Upload delusions - Wordpress InfusionSoft Gravity Forms Shell Upload (CVE-2014-6446) suiteshell - SuiteCRM Post-Auth Remote Code Execution (CVE-2015-NOTYET) suiteracer - SuiteCRM Post-Auth Remote Code Execution Race Condition (CVE-2015-xxxx) unsanitary - Address Sanitizer + Setuid Binary = Local Root exploit (LD_PRELOAD vector) DiamondFox - DiamondFox Botnet C&amp;C Panel Shell Upload DoubtfullyMalignant - BenignCertain

Google Drive Links(For Various Courses)

May be usefull *Useful links send to all group* *useful google drive links* Google drive movies - https://drive.google.com/drive/u/0/mobile/folders/0B6FjKMQKynZILTlwZHl4ajUwcFU *Programming language collection on google drive* - https://drive.google.com/drive/folders/0ByWO0aO1eI_MN1BEd3VNRUZENkU *Books*- https://drive.google.com/drive/folders/0B0hgUX3me1_RNi1KTXBzXzdXSzA *Google drive hacking ebook collection* - https://drive.google.com/drive/folders/0B-JzQsKoJaANbTFGN0RWLWhONms *Books for reading* - https://drive.google.com/drive/folders/0B09qtt10aqV1SGxRVXBWYmNIS2M *Books (novels)* - https://drive.google.com/drive/folders/0B1v9Iy1jH3FXdlNDeUNHNEVsZlE *Books* - https://drive.google.com/drive/folders/0B1Ef5shqGHDNRGEwd3BYb0N3Um8 *C programming tutorial* google drive - https://drive.google.com/drive/folders/0B1qoi1IlEKwaM2tSMFBmOGUyNzg *Udemy course google drive link* - https://drive.google.com/drive/folders/0B1HQDi7EkA9XNlR3STF5SVJIVUk *Programming books google drive*

The scariest thing about cyberwarfare

Home  »  Opinion Last Modified: Tue, Jul 11 2017. 01 41 AM IST The scariest thing about cyberwarfare Two superpowers may be stepping up a cyberwar without the rules of engagement that protect civilians in conventional wars Leonid Bershidsky There’s no cyberwar equivalent of the Geneva and Hague conventions. Photo: iStock A new report by  Bloomberg News  about Russia being suspected of hacking a dozen US power plants, including a nuclear one, is far more serious than any possible attempt to influence an election. It could be a sign of something even scarier: two military superpowers stepping up a cyberwar in the shadows and without rules of engagement that protect civilians from other kinds of warfare. Attacks on power grids have a potential for mass destruction. A temporary power outage doesn’t appear to be all that threatening compared with the use of chemical, biological or nuclear weapons, but blackouts kill people even when they don’t last long. A lasting power grid breakd

Darkcomet(Powerful RAT)Setup for Hacking

Darkcomet Out of Lan Hie Today we will talk about R.A.T windows PC using NGROK ============================================ Dedicated to my indian friends Hacking windows PC Many friends has requested me to make this tutorial :) so today we are here .. Most welcome to Hexking,  jama7 , R00t Destroyer , gaurav , Red Hex , Dreagon Dreagon , vampire kid and all the supporters of lulzsec india Lets start ... =========================================== For this you need 1) Ngrok (for forwading) 2) DarkComet (RAT) 3) Victim ( in india we call it as bakra ) 4) Brain.exe --------------------------------------------------------------------------- So for this Tutorial we are using DarkCometRAT531  Original you can download it from google no link will b provided Now we need to run ngrok ( IF YOU DON'T KNOW ABOUT NGROK GO TO MY BLOG AND SEE THE FIRST POST ) shown in below images : NGROK you need to open DarkComet there you will find Socket/NET it will b in last tab th

Some Cool Tools!! For Hacking

Hello All, As this is for sharing tools, here are a few I've written for 1) VPS deployment(https://github.com/ZephrFish/AttackDeploy); 2) Google Dorking for OSINT(https://github.com/ZephrFish/GoogD0rker) also for anyone who hasn't read the post I also did a blog post on each tool and their usage:   https://blog.zsec.uk/googd0rk-tool-attackdeploy/

Server Rooting With NGROK(Web Hacking) Best Tutorial

SUBSCRIBE LULZSEC INDIA New Security Comes with New vulnerability SERVER ROOTING WITH NGROK 2017 Hie  very welcome to Lulzsec blog  Today we will talk about ROOTING of server using NGROK   ============================================ Dedicated to my indian friends who has problem with rooting the server  Many friends has requested me to make this tutorial :) so today we are here .. Most welcome to Hexking,  jama7 , R00t Destroyer , gaurav , Red Hex , Dreagon , vampire kid and all the supporters of lulzsec india  Lets start ... =========================================== * SEE MY LAST POST ABOUT NGROK THEN CONTINUE WITH THIS POST * Link here    .. For that few things are required  ______________________ | 1) Ngrok                           |  | 2) Netcat                           | | 3) webshell on server     | | 4) Root exploit                 | --------------------------------- We can use any shell , if you dont have one download it from Github , I suggest you t

Backconnect Without Port forwarding With NG-ROCK for Hacking and Cracking:)

LULZSEC INDIA New Security Comes with New vulnerability - LulzSec india MORE… June 27, 2017 BACKCONNECT WITHOUT PORT FORWADING USING NGROK Hie.. very welcome to Lulzsec blog  Today we will talk about back connect using ngrok  ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Dedicated to my indian friends who has problem with there back connect to the server  all port forwarding solution is ngrok Many friends has requested me to make this tutorial :) so today we are here .. Most welcome to Hexking,  jama7 , R00t Destroyer , gaurav , Red Hex , Dreagon and all the supporters of lulzsec india  Lets start ... _________________________________________________________________________________ First of all you need to register on the site (  https://dashboard.ngrok.com/user/login  )  using Gmail or github account it is very easy ... 😄 Then after that go to the main page you can download the tool according to your system requirement  (  https://ngrok.com/

Petya New Ransomware like Wannacry(Sensitive)

Petya/Petwrap ransomware Affected countries: UK, Ukraine, India, the Netherlands, Spain, Denmark, and others ransomware, Petya does not encrypt files on a targeted system one by one. Affected Businesses: Maersk, an international logistics company, has also confined on Twitter that the latest Petya attacks have shut down its IT systems at multiple locations and business units. "We can confirm that Maersk IT systems are down across multiple sites and business units. We are currently asserting the situation. The safety of our employees, our operations and customers' business is our top priority. We will update when we have more information," the company said. The ransomware also impacts multiple workstations at Ukrainian branch's mining company Evraz. The most severe damages reported by Ukranian businesses also include compromised systems at Ukraine's local metro, and Kiev's Boryspil Airport. Affected Telecommunication Industry: Three Ukrainian telecommunicatio