1. SORM - official wiretapping
The most obvious way is official wiretapping by the state.
In many parts of the world, telephone companies are required to provide access to wiretapping lines for the competent authorities. For example, in Russia, in practice, this is done technically through SORM...
Phpvuln - Audit Tool To Find Common Vulnerabilities In PHP Source Code
phpvuln is an open source OWASP penetration testing tool written in Python 3, that can speed up the the process of finding common PHP vulnerabilities in PHP code, i.e. command injection, local/remote file inclusion and...
WSuspicious
Summary
This is a proof of concept program to escalate privileges on a Windows host by abusing WSUS. Details in this blog post: WSUS Attacks Part 2: CVE-2020-1013 a Windows 10 Local Privilege Escalation 1-Day | GoSecure It was inspired from the WSuspect proxy project...
ProtOSINT is a Python script that helps you investigate ProtonMail accounts and ProtonVPN IP addresses.
Description
This tool can help you in your OSINT investigation on Proton service (for educational purposes only).
ProtOSINT is separated in 3 sub-modules:
[1] Test the validity of one...
Using PatchChecker to check vulnerabilities:
To use the patchchecker, you can either go to the publicly hosted website here at patchchecker.com or you can git clone this repo, install the required libraries, makes sure patches.db is in the same directory as app.py and then start the application...
Getting a test Dedicated Server (two ways)
1. Go to bigd.host, register and confirm your email. Go to your account and click on the ORDER tab. Choose a configuration of up to 1000 rubles and up to 4 cores. Payment period select the test, confirm the number, click pay and get at the disposal of...
Tools for successful Carding Cashout
There are some software and carding tools needed if you want to be a good and successful carder. One thing is to know the right tools and another thing is to know how to set them up for use, you may know all the carding software but may not know how to use...