#KaliLinux #GreatSCT #Metasploit
The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool is intended for BOTH red and blue team.
https://github.com/GreatSCT/GreatSCT
GreatSCT
GreatSCT is a tool designed to generate metasploit payloads that bypass common anti-virus solutions and application whitelisting solutions.
GreatSCT is current under support by @ConsciousHacker
Software Requirements:
Linux
Kali - run the setup script - sudo ./setup.sh -c
NOTE: Support for distributions other than Kali Linux will be coming soon.
Setup (tl;dr)
NOTE: Installation must be done with superuser privileges. If you are not using Kali Linux, prepend each command with sudo or change to the root user before beginning.
Run ./setup.sh -c on Linux.
Install by cloning from git, not via apt!
Quick Install
apt-get -y install git
git clone https://github.com/GreatSCT/GreatSCT.git
cd GreatSCT/
cd setup
sudo ./setup.sh -c
Kali Linux 2019.4 Release
https://www.kali.org/news/kali-linux-2019-4-release/
We are incredibly excited to announce our fourth and final release of 2019, Kali Linux 2019.4, which is available immediately for download.
2019.4 includes some exciting new updates:
A new default desktop environment, Xfce
New GTK3 theme (for Gnome and Xfce)
Introduction of “Kali Undercover” mode
Kali Documentation has a new home and is now Git powered
Public Packaging – getting your tools into Kali
Kali NetHunter KeX – Full Kali desktop on Android
BTRFS during setup
Added PowerShell
The kernel is upgraded to version 5.3.9
… Plus the normal bugs fixes and updates.
#munya
munya
God Bless U Productions 2019 !!!
...
https://www.youtube.com/watch?v=HSCegVBkk08
#VirtualBox #Metasploitable #Windows
https://github.com/rapid7/metasploitable3
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
Metasploitable3
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities. It is intended to be used as a target for testing exploits with metasploit.
Metasploitable3 is released under a BSD-style license. See COPYING for more details.
Building Metasploitable 3
System Requirements:
OS capable of running all of the required applications listed below
VT-x/AMD-V Supported Processor recommended
65 GB Available space on drive
4.5 GB RAM
Requirements:
Packer
Vagrant
Vagrant Reload Plugin
VirtualBox, libvirt/qemu-kvm, or vmware (paid license required)
Internet connection.
To build automatically:
On Linux/OSX run ./build.sh windows2008 to build the Windows box or ./build.sh ubuntu1404 to build the Linux box. If /tmp is small, use TMPDIR=/var/tmp ./build.sh ... to store temporary packer disk images under /var/tmp.
On Windows, open powershell terminal and run .\build.ps1 windows2008 to build the Windows box or .\build.ps1 ubuntu1404 to build the Linux box. If no option is passed to the script i.e. .\build.ps1, then both the boxes are built.
If both the boxes were successfully built, run vagrant up to start both. To start any one VM, you can use:
vagrant up ub1404 : to start the Linux box
vagrant up win2k8 : to start the Windows box
When this process completes, you should be able to open the VM within VirtualBox and login. The default credentials are U: vagrant and P: vagrant.
...
https://www.youtube.com/watch?v=Ord2nnBwbo8
#iPhone #VoiceCalls #SoundMuffled
My phone sounds like it's underwater when I call people.
I have a question. My phone sounds like it's underwater when I call people. I looked it up and it says I need a new microphone. It wasn't my fault. I was in the middle of a Skype call when it cut out. My friend said they couldn't hear me. My mom can't hear me when she calls and neither can my dad. If I contact Apple support would they charge me. It's been after the 90 day mark
https://discussions.apple.com/thread/8019421
#MUSIC: DJ Favorite & DJ Kharitonov - Do You Wanna House (Original Mix)
munya
#munya
...
https://www.youtube.com/watch?v=Rh3HoQXK5bI
#ShellPy #Fernet #Linux
⭐⭐Special shout out to Usama & James thank...you!!!!⭐⭐
***Please Do Not Scan On Any Online Virus Scanners***
What is IVACY VPN?
https://www.ivacy.com/special-offer-vpn/?aff=90669
********************************************************
Discord: https://discord.gg/MABpJvc
ShellPY:
https://github.com/DarkSecDevelopers/shellpy
simple reverse shell with elevation to do various tasks that need elevation.
Shellpy
Simple reverse shell written in python 3
Things you need
Windows
Python 3.7
HOW TO INSTALL
git clone https://github.com/DarkSecDevelopers/shellpy.git
pip install -r requirements.txt
How to run
edit run.py and change IP(28th line) to your local or wan ip than just run python run.py Set up listener using netcat nc -lvp 4444 or meterpreter then just run .exe file and you'll get shell.
A python Code to obfuscate any non-fud python payload and generate a ready to use FUD Python executable script
Fernet_Obfuscator
A python Code to obfuscate any non-fud python payload and generate a ready to use FUD Python executable script
Fernet_Obfuscator
This is a tool to Obfuscate an existing python non fud payload and , in the process will create a FUD python ready to use script that can be used to perform different tasks.
In this Example I have shown how a non Fud python reverse shell , msf generated and a nc shell can be obfuscated to create a FUD payload
which can be used to gain a reverse shell on a victim machine .
Virustotal detection results :https://www.virustotal.com/gui/file/37f56970252e51258b8583b996501d50669bf996e472bfc35a1294f09accf19e/detection
Please do not upload to virus total.
Usage : python fernet_obs.py nonfud_payload.py
https://github.com/1captainnemo1/Fernet_Obfuscator
#munya
munya
...
https://www.youtube.com/watch?v=1nRdwdsMTKU
Sell your house fast, Riverside, San-Bernardino, #1 House Buyer!
http://www.ibuyandsellhousesincali.com/sell-your-house/
...
https://www.youtube.com/watch?v=MwQJmP1jpSQ
#Metasploit #PuttyExploit #Windows
Inject malicious msf codes n putty and exploit ur target system.
https://github.com/mRanonyMousTZ/puttyEXPLOIT
puttyEXPLOIT
. PuTTY is a free and open-source terminal emulator, serial console and network file transfer application. It supports several network protocols, including SCP, SSH, Telnet, rlogin, and raw socket connection. It can also connect to a serial port. The name "PuTTY" has no official meaning.
PuTTY was originally written for Microsoft Windows, but it has been ported to various other operating systems. Official ports are available for some Unix-like platforms, with work-in-progress ports to Classic Mac OS and macOS, and unofficial ports have been contributed to platforms such as Symbian,Windows Mobile and Windows Phone.
PuTTY was written and is maintained primarily by Simon Tatham, a British programmer.
About This tool
this is not only for putty but if ur gud enough u can inject other software.
puttyEXPLOIT help u to inject a malicious backdoor codes in putty.exe then u can use it to exploit any windows system.
VERY SIMPLE and anyone can program this tool.
⭕️ warning
Use it wisely am not responsible 4 any misuses , only for Educational purposes
⭕️ Get started
git clone https://github.com/mRanonyMousTZ/puttyEXPLOIT.git
cd puttyEXPLOIT
chmod +x puttyExploit.sh
./puttyExploit.sh
Requirements
. msfconsole
. msfvenom
simple install it sudo apt-get install metasploit-framework
munya
#munya
God Bless U Productions 2019 !!!
...
https://www.youtube.com/watch?v=2Ql962lgwqE
Sell Your Home Fast Cash| Riverside | San Bernardino |SoCal
https://codings9.wixsite.com/sellyourhousefast
...
https://www.youtube.com/watch?v=Cl95xI05tK8