Expose local servers to the internet No installation, no signup https://serveo.net/
ssh -R 80:localhost:3000 serveo.net
How does it work? #Serveo is an #SSH server just for remote port forwarding. When a user connects to Serveo, they get a public URL that anybody can use to connect to their localhost server.
#MUSIC: Øfdream - Fallen Angel #MUSIC: KVPV - Fall Into You [ELECTRONICA DOWNTEMPO]
#Venom #Linux #ShellCode
venom - shellcode generator/compiler/handler (metasploit)
https://github.com/r00t-3xp10it/venom
LEGAL DISCLAMER
The author does not hold any responsibility for the bad use
of this tool, remember that attacking targets without prior
consent is illegal and punished by law.
FRAMEWORK DESCRIPTION
The script will use msfvenom (metasploit) to generate shellcode
in diferent formats ( c | python | ruby | dll | msi | hta-psh )
injects the shellcode generated into one template (example: python)
"the python funtion will execute the shellcode into ram" and uses
compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller
to build the executable file, also starts a multi-handler to
recive the remote connection (shell or meterpreter session).
'venom generator' tool reproduces some of the technics used
by Veil-Evasion.py, unicorn.py, powersploit.py, etc, etc, etc..
"P.S. some payloads are undetectable by AV soluctions... yes!!!"
One of the reasons for that its the use of a funtion to execute
the 2º stage of shell/meterpreter directly into targets ram
the other reazon its the use of external obfuscator/crypters.
munya
#munya
God Bless U Productions 2019 !!!
...
https://www.youtube.com/watch?v=PryJ6ctaSYQ
Riverside & San Bernardino Local Real Estate Investor-MunYa
https://codings9.wixsite.com/sellyourhousefast
...
https://www.youtube.com/watch?v=89CVQuoYBgw
#ShellPhish #KaliLinux
Disclaimer this is meant for educational purposes only.
All tests are run and conducted on my own computer lab.
I am not responsible nor i am liable for what this tool is used for.
https://github.com/thelinuxchoice/shellphish
...
https://www.youtube.com/watch?v=KX05sz1dqUs
#Metasploitable3 #Python #KaliLinux
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
https://github.com/rapid7/metasploitable3
Antivirus Evasion with Python
https://medium.com/bugbountywriteup/antivirus-evasion-with-python-49185295caf1
https://gist.github.com/msacchetin
https://gist.github.com/msacchetin/9d08a78ec1f6151730a644f25d1ca6a7#file-mrtp-py
https://youtu.be/zRkrx3ikc0g
#MUSIC: Rino Garcia - Represent (Club Mix)
#MUSIC: Lets Go
#MUSIC: Space Funk '75 (Extended Mix)
#munya
munya
...
https://www.youtube.com/watch?v=rUSlfcyO7Go
#Persistence #Persistent #Windows #KaliLinux
#shikataganai #shikata_ga_nai
shikata ga nai
https://www.offensive-security.com/metasploit-unleashed/about-meterpreter/
What is Meterpreter?
Meterpreter is an advanced, dynamically extensible payload that uses in-memory DLL injection stagers and is extended over the network at runtime. It communicates over the stager socket and provides a comprehensive client-side Ruby API. It features command history, tab completion, channels, and more.
Metepreter was originally written by skape for Metasploit 2.x, common extensions were merged for 3.x and is currently undergoing an overhaul for Metasploit 3.3. The server portion is implemented in plain C and is now compiled with MSVC, making it somewhat portable. The client can be written in any language but Metasploit has a full-featured Ruby client API.
Meterpreter is an advanced, dynamically extensible payload that uses in-memory DLL injection stagers and is extended over the network at runtime. It communicates over the stager socket and provides a comprehensive client-side Ruby API. It features command history, tab completion, channels, and more.
About the Metasploit Meterpreter - Metasploit Unleashed
https://www.offensive-security.com/metasploit-unleashed/about-meterpreter/
Meterpreter Backdoor - Metasploit Unleashed - Offensive Security
https://www.offensive-security.com › Metasploit Unleashed
Using the metsvc backdoor, you can gain a Meterpreter shell at any point. ... msf exploit(3proxy) exploit [*] Started reverse handler [*] Trying target Windows XP SP2 - English... ... Since we’re already connected via a Meterpreter session, we won’t set it to connect back to us right ...
Metasploit tutorial part 2: Using meterpreter - Computer Weekly
https://www.computerweekly.com/tip/Metasploit-tutorial-part-2-Using-meterpreter
Meterpreter is a post-exploitation tool based on the principle of 'In memory DLL injection'.
What is Meterpreter ? | Security Wiki - Secret Double Octopus
https://doubleoctopus.com › Security Wiki › Threats and Tools
Meterpreter. Meterpreter is a Metasploit attack payload that provides an interactive shell from which an attacker can explore the target machine and execute code. Meterpreter is deployed using in-memory DLL injection. As a result, Meterpreter resides entirely in memory and writes nothing to disk.
What is Meterpreter, the Advanced and Powerful Metasploit Payload
https://www.sentinelone.com/blog/meterpreter-advanced-powerful-metasploit-payload/
Sep 6, 2018 - Meterpreter is a powerful weapon that can be exploited by cyber criminals to perform fileless attacks. See how SentinelOne detects and blocks ...
msfconosle
meterpreter
setoolkit
#SET
#setoolkit
#msfconsole
#meterpreter
unix
#unix
linux
#linux
windows 7
win7
windo
...
https://www.youtube.com/watch?v=uwVBugwP26A
? #wifijammer #kalilinux #wifi ?
Ivacy VPN?
Privacy made Simple
https://www.ivacy.com/special-offer-vpn/?aff=90669
https://tools.kali.org/wireless-attacks/mdk3
MDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses. IMPORTANT: It is your responsibility to make sure you have permission from the network owner before running MDK against it.
MDK3 (Disconnect wifi) on Kali Linux 2019
WARNING:
► THIS VIDEO IS FOR EDUCATIONAL PURPOSE, TO BE KNOW AND AT LEAST YOU CAN PREVENT IT, THIS IS JUST TO DETECT VULNERABILITY, DO NOT USE FOR ILLEGAL PURPOSE.
---------------------------------------------------------------------------------------------------------------------------------------------------------------
MDK3 is one of the tools already contained in Kali Linux. is very flexible and contains many options that take advantage of various weaknesses in the 802.11 protocol.
The Illegal WiFi Jammer
WiFi "Jammer" Tutorial - Kali Linux
This is a proof of the concept of exploiting tools and should not run without the permission of the network owner. including the option to perform a DoS attack by sending multiple authentication packets, sending a deauthentication packet that kicked the computer from the network and the option to try out a known range of MAC addresses to authenticate to the network while dynamically changing the timeout.
...
https://www.youtube.com/watch?v=nX-HUsUh33Y