CredsStealer CredsStealer allows an attacker to craft a highly convincing credentials prompt using Windows PromptForCredential, validate it against the DC or localmachine and in turn leak it via an HTTP request.
How to run (2) python3 run.py
Things you need Linux x64 Parrot Security OS x64 Kali linux x64
How to install (1) pip3 install -r requirements.txt
http://www.ibuyandsellhousesincali.com/sell-your-house/
We Buy Houses Fast Cash 951-389-0232
As-Is, Any property, Any condition, Anywhere Call or Text 951-389-0232
Get your best cash offer for your home now 951-389-0232.
Cash Offer For California Houses. Call 951-389-9232 Today!
Riverside CA & San-Bernardino's #1 Home Buyer · Open 24 Hours ·
Types: Inherited Home, House in Need of Repair, Facing Foreclosure, Ugly Situation
We Buy California Houses Fast For Cash. No Fees. Get Your Best Cash Offer Today!
We Do All The Repairs · Cash In Days · No Fees or Commissions · We Do All The Paperwork
Types: Inherited Homes, House In Need of Repair, Ugly Situations, Distressed Real Estate
...
https://www.youtube.com/watch?v=FYHgacTo4Tw
Sell your house fast, Riverside, San-Bernardino, #1 House Buyer!
http://www.ibuyandsellhousesincali.com/sell-your-house/
...
https://www.youtube.com/watch?v=MwQJmP1jpSQ
#Venom#AMSI #KaliLinux
venom - shellcode generator/compiler/handler (metasploit)
https://github.com/r00t-3xp10it/venom
VENOM 1.0.16 - metasploit Shellcode generator/compiller
Version release : v1.0.16
Author : pedro ubuntu [ r00t-3xp10it ]
Codename: Aconite (Aconitum napellus)
Distros Supported : Linux Ubuntu, Kali, Mint, Parrot OS
Suspicious-Shell-Activity (SSA) RedTeam develop @2019.
LEGAL DISCLAMER
The author does not hold any responsibility for the bad use of this tool, remember that attacking targets
without prior consent is illegal and punished by law. So use this tool responsibly.
FRAMEWORK DESCRIPTION
The script will use msfvenom (metasploit) to generate shellcode in diferent formats ( C# | python | ruby
dll | msi | hta-psh | docm | apk | macho | elf | deb | mp4 | etc ) injects the shellcode generated into
one template (example: python) "the python funtion will execute the shellcode into ram" and uses compilers
like gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file. It also starts a
multi-handler to recive the remote connection (shell or meterpreter session).
'venom generator' reproduces some of the technics used by Veil-Evasion.py, unicorn.py, powersploit.py, etc..
DOWNLOAD/INSTALL
1º - Download framework from github
git clone https://github.com/r00t-3xp10it/venom...
2º - Set execution permitions
cd venom-main
sudo find ./ -name "*.sh" -exec chmod +x {} \;
sudo find ./ -name "*.py" -exec chmod +x {} \;
3º - Install all dependencies
cd aux && sudo ./setup.sh
4º - Run main tool
sudo ./venom.sh
Update venom instalation (compare local version againts github oficial version)
sudo ./venom.sh -u
DEPENDENCIES
Zenity | Metasploit | GCC (compiler) | Pyinstaller (compiler) | mingw32 (compiler) | pyherion.py (crypter)
wine (emulator) | PEScrambler.exe (PE obfuscator) | apache2 (webserver)| winrar (wine) | shellter (KyRecon)
vbs-obfuscator (obfuscator) | avet (Daniel Sauder) | ettercap (MitM + DNS_Spoofing) | icmpsh (ICMP shell)
openssl (build SSL certs) | CarbonCopy (sign exe binarys) | ResourceHacker (wine) | NXcrypt (python crypter)
"venom.sh will download/install all dependencies as they are needed". Adicionally was build the script
venom-main/aux/setup.sh to help you install all framework dependencies fast and easy. we just need to install
first the most importante dependencies before trigger setup.sh = zenity, metasploit, ettercap ..
...
https://www.youtube.com/watch?v=r_t2DPbDgME
#Veil #VeilEvasion #KaliLinux #Windows 10
apt-get install veil
OR:
https://github.com/Veil-Framework/Veil
Veil is a tool designed to generate metasploit payloads that bypass common anti-virus solutions.
Veil is current under support by @ChrisTruncer
bypass av
bypass antivirus
bypass anti-virus
evading antivirus
evading avs
evading avs
#Kali
#munya
...
https://www.youtube.com/watch?v=utahnpkL8k8
#Wifite2 #WEP #KaliLinuX[2019.1]
[Disclaimer: God is Great] Please note it is illegal to
attack wireless routers or access points without explicit consent.
I am not liable or responsible for your misuse of this video
and or it's content.
#Music: Dubvirus_Spiral_Animals_Part_II
Rewrite of the popular wireless network auditor, "wifite"
https://github.com/derv82/wifite2
Install Wifite
To install onto your computer (so you can just run wifite from any terminal), run:
sudo python setup.py install
This will install wifite to /usr/sbin/wifite which should be in your terminal path.
Note: Uninstalling is not as easy. The only way to uninstall is to record the files installed by the above command and remove those files:
git clone https://github.com/derv82/wifite2.git
cd wifite2
sudo ./Wifite.py
sudo python setup.py install --record files.txt \
&& cat files.txt | xargs sudo rm \
&& rm -f files.txt
#wifite2
Old School #OldSchool
#WEP encyrption
WEP encyrption
WEP protocol
#wireless
WEP
#wireless router security
#wifi router secuiryt
wireless ap security
wireless access point security
#Wepattack
wep attack
Wifite
This repo is a complete re-write of wifite, a Python script for auditing wireless networks.
Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches!
Wifite is designed to use all known methods for retrieving the password of a #wireless access point (router). These methods include:
#WPS: The Offline Pixie-Dust attack
#WPS: The Online Brute-Force PIN attack
#WPA: The WPA Handshake Capture + offline crack.
#WPA: The PMKID Hash Capture + offline crack.
#WEP: Various known attacks against WEP, including fragmentation, chop-chop, aireplay, etc.
Run wifite, select your targets, and Wifite will automatically start trying to capture or crack the password.
#Cracking a weak WEP #password (using the WEP Replay attack):
Wired Equivalent Privacy (#WEP)
#munya
munya
...
https://www.youtube.com/watch?v=OTN3hiv3XIA
#Venom #NetCat #Persistence
venom - shellcode generator/compiler/handler (metasploit)
https://github.com/r00t-3xp10it/venom
VENOM 1.0.16 - metasploit Shellcode generator/compiller
Version release : v1.0.16
Author : pedro ubuntu [ r00t-3xp10it ]
Codename: Aconite (Aconitum napellus)
Distros Supported : Linux Ubuntu, Kali, Mint, Parrot OS
Suspicious-Shell-Activity (SSA) RedTeam develop @2019.
LEGAL DISCLAMER
The author does not hold any responsibility for the bad use of this tool, remember that attacking targets
without prior consent is illegal and punished by law. So use this tool responsibly.
FRAMEWORK DESCRIPTION
The script will use msfvenom (metasploit) to generate shellcode in diferent formats ( C# | python | ruby
dll | msi | hta-psh | docm | apk | macho | elf | deb | mp4 | etc ) injects the shellcode generated into
one template (example: python) "the python funtion will execute the shellcode into ram" and uses compilers
like gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file. It also starts a
multi-handler to recive the remote connection (shell or meterpreter session).
'venom generator' reproduces some of the technics used by Veil-Evasion.py, unicorn.py, powersploit.py, etc..
DOWNLOAD/INSTALL
1º - Download framework from github
git clone https://github.com/r00t-3xp10it/venom...
2º - Set execution permitions
cd venom-main
sudo find ./ -name "*.sh" -exec chmod +x {} \;
sudo find ./ -name "*.py" -exec chmod +x {} \;
3º - Install all dependencies
cd aux && sudo ./setup.sh
4º - Run main tool
sudo ./venom.sh
Update venom instalation (compare local version againts github oficial version)
sudo ./venom.sh -u
DEPENDENCIES
Zenity | Metasploit | GCC (compiler) | Pyinstaller (compiler) | mingw32 (compiler) | pyherion.py (crypter)
wine (emulator) | PEScrambler.exe (PE obfuscator) | apache2 (webserver)| winrar (wine) | shellter (KyRecon)
vbs-obfuscator (obfuscator) | avet (Daniel Sauder) | ettercap (MitM + DNS_Spoofing) | icmpsh (ICMP shell)
openssl (build SSL certs) | CarbonCopy (sign exe binarys) | ResourceHacker (wine) | NXcrypt (python crypter)
"venom.sh will download/install all dependencies as they are needed". Adicionally was build the script
venom-main/aux/setup.sh to help you install all framework dependencies fast and easy. we just need to install
first the most importante dependencies before trigger setup.sh = zenity, metasploit, ettercap ..
...
https://www.youtube.com/watch?v=ty9c82B9XgM
#RevealerKeylogger #Windows #KeyLogger
Best Price & Best VPN?
https://www.ivacy.com/special-offer-vpn/?aff=90669
Discord: https://discord.gg/MABpJvc
Revealer Keylogger Free 2019
The most popular free monitoring software with over 10 million downloads.
Download Here:
https://mega.nz/#!d8M3HKAZ!hlE7_AkdZJAZP4Q_sKCtOfIhjBv2QVkbEhzbqJ3Efvg
Password Protection
Prevents someone else from opening the program.
Keystroke Logging
Records text, passwords and conversations.
Screenshots
Takes screenshots of the desktop or active window.
Full Invisible Mode
Hides in Task Manager, at startup and on the drive.
Remote Monitoring
Sends log files via email, Dropbox, ftp or local network.
https://www.logixoft.com/en-us/index
Escalation / Bypass Windows UAC
https://github.com/NYAN-x-CAT/UAC-Escaper
#munya
munya
God Bless U Productions 2019 !!!
...
https://www.youtube.com/watch?v=LFFcieAR5I4