■■■■□ https://rastamouse.me/externalc2-net/ https://t.me/cKure/10108
All posts tagged hack
November 18, 2021 at 12:08AM
■■□□□ Introducing CookieMonster: a tool for breaking stateless authentication. https://ian.sh/cookiemonster https://t.me/cKure/10107
November 17, 2021 at 11:16PM
There is a bot that is created to publish a message if I (the admin of ckure) somehow cease to be. The post(s) shall have the following hash and verified by the PKI. The message can be accessed a few months after Day 0 and will be available from the official channel and some websites…
November 17, 2021 at 12:46PM
■■■□□ GitHub disclosed two major vulnerabilities in the npm that have been already addressed. Maintainers of the npm package manager for the JavaScript programming language disclosed multiple flaws that were recently addressed. https://securityaffairs.co/wordpress/124671/security/github-npm-package-flaws.html https://t.me/cKure/10105
November 17, 2021 at 02:14AM
■■□□□ OS-INTEL Tool Toutatis: extract information from instagrams accounts such as e-mails, phone numbers | OSINT https://github.com/megadose/toutatis https://t.me/cKure/10104
November 17, 2021 at 01:24AM
■■■□□ Data-Leak: 200M Adult Cam Model, User Records Exposed in Stripchat Breach. The leak included model information, chat messages and payment details. https://threatpost.com/adult-cam-model-user-records-exposed-stripchat-breach/176372/ https://t.me/cKure/10103
November 17, 2021 at 01:22AM
■■■□□ 🔧 Tool: Gotanda – Browser Web Extension For OSINT. https://github.com/HASH1da1/Gotanda https://t.me/cKure/10102
November 17, 2021 at 01:18AM
■□□□□ Emotet malware that was dubbed the World’s Most Dangerous and Widely Spread Malware is back. https://www.hackread.com/emotet-malware-reemerges-botnet-trickbot-malware/ https://t.me/cKure/10101
November 16, 2021 at 09:42PM
■□□□□ Zoom has patched vulnerabilities in its range of local solutions for conferences, negotiations and recordings – Zoom Meeting Connector Controller, Zoom Virtual Room Connector, Zoom Recording Connector and others. The errors identified by Positive Technologies researcher Egor Dimitrenko made it possible for attackers to enter commands to execute an attack and, thus, obtain server…
November 16, 2021 at 09:40PM
■■■■□ Interesting thread! Rename procdump.exe to dump64.exe and place it in the “C:\Program Files (x86)\Microsoft Visual Studio\*” folder, you can bypass Defender and dump LSASS. https://t.co/Vk8vPYFTPC https://t.me/cKure/10099
