We'll Buy Your Home, No Fees, No Hassles, Riveriside, San Bernardino
http://www.ibuyandsellhousesincali.com/sell-your-house/ We-Buy-Houses-Fast-Cash| Riverside | San-Bernardino |951-389-0232 Local Real Estate Investor, located in SoCal. I buy houses "AS-IS."I can close quickly. California Owned Business. No Fees, No Hassles, I am pretty chill and if your situation is a fit-i can get you fast cash and close quickly. ... https://www.youtube.com/watch?v=qgWcmBJrRwg
#Tortuga #SMS #Spammer
Ivacy VPN?
Privacy made Simple
https://www.ivacy.com/special-offer-vpn/?aff=90669
An sms spammer or bomber for #Android, #Linux and #Windows?
https://github.com/MetaChar/Tortuga
An sms tool for Andriod, Linux and Windows
Install & Run (Linux & Andriod)
git clone https://github.com/MetaChar/Tortuga
cd Tortuga
pip install smtplib
python2 sms.py
#MUSIC: KVPV_Dirt_G_HOUSE_
#munya
munya
SMS spammer
SMS bomber
linux sms spammer
android sms spammer
windows sms spammer
linux sms spammer
Tortuga sms spammer
...
https://www.youtube.com/watch?v=HjhU7LlRWM0
#FOCA #Metadata
Find & fingerprint hidden information #Metadata
FOCA find & #fingerprint #hidden #information Metadata
https://www.elevenpaths.com/labstools/foca/index.html#
FOCA (#Fingerprinting Organizations with Collected Archives) is a tool used mainly to find #metadata and #hidden #information in the documents its scans. These documents may be on #web pages, and can be downloaded and analyzed with #FOCA.
It is capable of analyzing a wide variety of documents, with the most common being #Microsoft #Office, #Open #Office, or #PDF files, although it also analyzes #Adobe #InDesign or #SVG files, for instance.
These documents are searched for using three possible search engines: #Google, #Bing, and #DuckDuckGo. The sum of the results from the three engines amounts to a lot of documents. It is also possible to add local files to extract the #EXIF information from graphic files, and a complete analysis of the information discovered through the URL is conducted even before downloading the file.
With all data extracted from all files, FOCA matches information in an attempt to identify which documents have been created by the same team and what servers and clients may be infered from them.
#MUSIC: KVPV - Mundo [G-HOUSE]
FOCA includes a server discovery module, whose purpose is to automate the servers search process using recursively interconnected routines. The techniques used to this end are:
#WebSearch Web Search
Searches for hosts and domain names through #URLs associated to the main domain. Each link is analyzed to extract from it new host and domain names.
#DNS Search
Each domain is checked to ascertain which are the host names configured in NS, MX, and SPF servers to discover new host and domain names.
#IP resolution
Each host name is resolved by comparison to the DNS to obtain the IP address associated to this server name. To perform this task as accurately as possible, the analysis is carried out against a DNS that is internal to the organization.
#PTR Scanning
To find more servers in the same segment of a determined address, IP FOCA executes a PTR logs scan.
#Bing IP
For each IP address discovered, a search process is launched for new domain names associated to that IP address.
Common names
This module is designed to carry out dictionary attacks against the DNS. It uses a text file containing a list of common host names such as ftp, pc01, pc02, intranet, extranet, internal, test, etc.
#DNS Prediction
Used for those environments where a machine name has been discovered that is reason to suspect that a pattern is used in the naming system.
#Robtex
The Robtex service is one of many services available on the Internet to analyze IP addresses and domain names. FOCA uses it in its attempt to discover new domains by searching the inf
...
https://www.youtube.com/watch?v=CVdG5Fkbj6E
#MadWin #BypassAntivirus #KaliLinux
Ivacy VPN?
Privacy made Simple
https://www.ivacy.com/special-offer-vpn/?aff=90669
***Special shout out to Hack-Athon, thank you***
A shell script that generates obfuscated reverse shell backdoors in C++ to bypass common antivirus software.
https://drive.google.com/file/d/1HesFrA-MhLKwXMrywQcv2MDhfNI68Ys-/view?usp=sharing
https://github.com/mado-95/madwin
https://drive.google.com/file/d/1HesFrA-MhLKwXMrywQcv2MDhfNI68Ys-/view?usp=sharing
madwin v0.1 | https://github.com/mado-95/madwin
codename umeni | committed 02/03/2019
Changelog
v0.1
Created madfill.py - python script to pump executable by appending with 0s
Added two calls of madfill.py
Added an extra call of GNU/Strip
Changed dependency installation; added error message
Script optimization
Description
This project is a bash script that creates FUD executables capable of spawning reverse shells upon execution, written in C++. It also remotely listens via Serveo, making it harder to tell where the shell was going in post-exploitation forensics. It comes with four icons to use as your executable thumbnail, as well as a copy of PuTTY to rip a signature from. Feel free to supply your own files when prompted, however.
Detection Rates
13/69 via VirusTotal on executable created using madwin v0.0 https://www.virustotal.com/#/file/7cc5c910f42630a68e92340c73416944687a33924928696863b22bbede8d977d/detection
Script Breakdown
The setup function will install necessary packages via APT
The script will take user input for executable settings
The source code will be created and obfuscated using madPadder
The obfuscated source code is compiled into an executable
The executable is purged of development files via GNU/Strip
The executable is pumped approximately 3MB via madfill.py
The executable is compressed via UPX
The executable is stripped again
The executable is pumped approximately 3MB again
The executable is spoof-signed via secretsquirrel's SigThief
The listener function prompt if you want to jump to the listener or not. Since port numbers are randomized, the only way you can run your listener for that specific executable again is by running server.sh Please note the script writes the required info to lib/server.dat so you won't be able to listen if you don't have the specific dat file from the compilation.
Usage
git clone https://github.com/mado-95/madwin
cd madwin
bash madwin.sh
Software I used
When it comes down to it, madwin is just a script putting together a few neat pieces of software. Credits to:
TheLinuxChoice for GetWin, the inspo and basis of this project
StreetSec (whoever they are) for FatRat, namely powerfull.sh, with madPadder is based on
The UPX team for UPX, an excellent executable compresser
secretsquirrel for SigThief, an amazing and easy-to-use signat
...
https://www.youtube.com/watch?v=uHkOCAUiEyA
#HiddenEye #Phishing #Keylogger
https://www.ivacy.com/download-vpn/
Ivacy has dedicated apps for all leading platforms! So whether your device is powered by Windows, Android, Mac or iOS, you can protect your data and privacy from a horde of online threats such as hackers, snoopers, spammers, malware, spyware and even government surveillance!
https://www.ivacy.com/download-vpn/
Special shout out to Usama, and the DarkSecDevelopers team,
thank you!
Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]
https://github.com/DarkSecDevelopers/HiddenEye
Modern Phishing Tool With Advanced Functionality
PHISHING | KEYLOGGER | INFORMATION_COLLECTOR | ALL_IN_ONE_TOOL | SOCIALENGINEERING
Installation:
RUNNING (In Linux)
chmod 777 HiddenEye
sudo apt install python3-pip
cd HiddenEye
sudo pip3 install -r requirements.txt
python3 HiddenEye.py
CREDIT:-
Anonud4y ( I don't remember if i have done Anything )
Usama ( A Most active Developer)
sTiKyt ( Guy Who recustomized everything )
UNDEADSEC (For His wonderful repo socialfish which motivated us a lot)
TheLinuxChoice ( For His Tools Phishing Pages )
TESTED ON FOLLOWING:-
Kali Linux - Rolling Edition
Parrot OS - Rolling Edition
Linux Mint - 18.3 Sylvia
Ubuntu - 16.04.3 LTS
MacOS High Sierra
Arch Linux
Manjaro XFCE Edition 17.1.12
Black Arch
Userland app (For Android Users)
PREREQUISITES ( Please verify if you have installed )
Python 3
Wget from Python
PHP
sudo
AVAILABLE PAGES
1) Facebook:
Traditional Facebook login page.
Advanced Poll Method.
Fake Security login with Facebook Page.
Facebook messenger login page.
2) Google:
Traditional Google login page.
Advanced Poll Method.
New Google Page.
3) LinkedIn:
Traditional LinkedIn login page.
4) Github:
Traditional Github login page.
5) Stackoverflow:
Traditional Stackoverflow login page.
6) Wordpress:
Similar Wordpress login page.
7) Twitter:
Traditional Twitter login page.
8) Instagram:
Traditional Instagram login page.
Instagram Autoliker Phishing Page.
Instagram Profile Scenario Advanced attack.
Instagram Badge Verify Attack [New]
Instagram AutoFollower Phishing Page by (https://github.com/thelinuxchoice)
9) SNAPCHAT PHISHING:
Traditional Snapchat Login Page
10) YAHOO PHISHING:
Traditional Yahoo Login Page
11) TWITCH PHISHING:
Traditional Twitch Login Page [ Login With Facebook Also Available ]
12) MICROSOFT PHISHING:
Traditional Microsoft-Live Web Login Page
13) STEAM PHISHING:
Traditional Steam Web Login Page
14) VK PHISHING:
Traditional VK Web Login Page
Advanced Poll Method
15) ICLOUD PHISHING:
Traditional iCloud Web Login Page
16) GitLab PHISHING:
Traditional GitLab Login Page
17) NetFlix PHISHING:
Traditional Netflix Login Page
18) Origin PHISHING:
Traditional Origin Login Page
19) Pinterest PHISHING:
Trad
...
https://www.youtube.com/watch?v=thpEjgl4Bko
#ParrotSecurityOS #Windows 10 #WebAttack
Parrot Security is our complete all-in-one environment for pentesting, privacy, digital forensics, reverse engineering and software development.
The system includes a full arsenal of security oriented tools to cover many categories of the work of a pentester.
https://www.parrotsec.org/download-security.php
Download Windows 10
https://www.microsoft.com/en-us/software-download/windows10
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
The Social-Engineer Toolkit is an open-source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that allow you to make a believable attack quickly. SET is a product of TrustedSec, LLC – an information security consulting firm located in Cleveland, Ohio.
Supported platforms
Linux ?
Mac OS X ?
nstall via requirements.txt
$ pip install -r requirements.txt
Install SET
All OSs
$ git clone https://github.com/trustedsec/social-engineer-toolkit/ set/
$ cd set
$ pip install -r requirements.txt
#MUISIC: Lucky Luke - U Got Me
#munya
munya
...
https://www.youtube.com/watch?v=2zbg7M_Bu3Y
http://www.ibuyandsellhousesincali.com/sell-your-house/
We Buy Houses Fast Cash 951-389-0232
As-Is, Any property, Any condition, Anywhere Call or Text 951-389-0232
Get your best cash offer for your home now 951-389-0232.
Places We Buy Homes:
We Buy Houses In California
We Buy Houses In San Bernardino
We Buy Houses In Riverside
We Buy Houses In Rialto
We Buy Houses In Moreno Valley
We Buy Houses In SoCal
We Buy Houses In Inland Empire
We Buy Houses In Cali
We Buy Houses In San-Bernardino
We Buy Houses In Inland-Empire
We Buy Houses In IE
We Buy Homes in California
We Buy Homes in San Bernardino
We Buy Homes in Riverside
We Buy Homes in Rialto
We Buy Homes in Moren Valley
We Buy Homes in SoCal
We Buy Homes in the Inland Empire
We Buy Homes in Cali
We Buy Homes in San Bernardino
Sell my house fast san bernardino
Sell my home fast san bernardino
Sell my home fast riverside
Sell my house fast riverside
home buyer
house buyer
real estate
...
https://www.youtube.com/watch?v=7F8jJ5kBixI