find

This information concerns the security of your account (SCAM)

1 Star2 Stars3 Stars4 Stars5 Stars (4 votes, average: 5.00 out of 5)
Loading...

NUNCA HAY QUE HACER CASO A ESTE TIPO DE CORREOS SON UN TIMO. Esto ha llegado hoy a mi correo: Hi! I am a hacker who has access to your operating system. I also have full access to your account: At the time of hacking your account(@gmail.com) had this password: You can say: this is my, but old password! Or: I can change my password at any time! Of course! You will be right, but the fact is that when you change the password, my malicious code every time saved a new one! I’ve been watching you for a few […]


pspy – unprivileged linux process snooping

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...

pspy is a command line tool designed to snoop on processes without need for root permissions. It allows you to see commands run by other users, cron jobs, etc. as they execute. Great for enumeration of Linux systems in CTFs. Also great to demonstrate your colleagues why passing secrets as arguments on the command line is a bad idea. The tool gathers it’s info from procfs scans. Inotify watchers placed on selected parts of the file system trigger these scans to catch short-lived processes. Getting started Get the tool onto the Linux machine you want to inspect. First get the […]


Subscribe to the Azure Video Indexer API

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...

Sign in.To start developing with Video Indexer, you must first Sign In to the Video Indexer portal. If signing in with an AAD account (for example, alice@contoso.onmicrosoft.com) you must go through two preliminary steps: Contact us to register your AAD organization’s domain (contoso.onmicrosoft.com). Your AAD organization’s admin must first sign in to grant the portal permissions to your org. To do this, the organization’s admin must navigate to https://login.microsoftonline.com/common/adminconsent?client_id=e97b04d3-3e10-41fb-926f-b3c868fef6df&redirect_uri=https://videobreakdown.portal.azure-api.net/signin-aad, sign in and give consent. Subscribe.Select the Products tab. Then, select Production and subscribe. Once you subscribe, you will be able to see your subscription and your primary and secondary keys. The keys should be protected. […]


THC-Hydra 8.6

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...

Hydra is born more than 10 years ago, this page is used as a recap of the functionalities it provides, but also the differences in feature sets, services coverage and code between the most popular network authentication cracker tools available. Each feature is compared against Hydra as of the current version. This table is updated as new features are added to the project. If you find any inaccuracies on this page please do not hesitate to contact us. [0x00] News and Changelog Check out the feature sets and services coverage page – including a speed comparison against ncrack and medusa (yes, we […]


How to find Windows uptime?

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...


5. Gestión del software en PowerShell (nivel intermedio)

1 Star2 Stars3 Stars4 Stars5 Stars (2 votes, average: 3.50 out of 5)
Loading...

El software es la parte que no se puede tocar del ordenador (intangible), es un elemento lógico y se define como un conjunto de órdenes e instrucciones que al ejecutarse sirven para realizar alguna tarea (los programas sin ejecutar son simples archivos en disco). Con el software se saca partido al ordenador, sin software el ordenador sería un conjunto de placas, tarjetas y cables sin ninguna utilidad. Los sistemas operativos instalados programas pero también se pueden instalar otros. El software se puede dividir en tipos: Software de sistema. Conjunto de programas que administran los recursos del ordenador. Software de programación. […]


Faraday v2.4: Collaborative Penetration Test and Vulnerability Management Platform

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

Faraday Client is the software which will allow you to work with your favorite security tools and capture their output in an organized manner. It works under a GTK+3 interface with the popular VTE terminal with a custom ZSH shell that respects the user’s configuration (yes, that means you get to keep your exact ZSH terminal inside Faraday, even if you use ZPrezto or Oh My ZSH). Quick install Download the latest tarball or clone the Faraday Git Project:

Plugins Faraday plays well with others, right now it has more than 50 supported tools, among them you will find: […]


Pasos para configurar Bash Bunny en español

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...

Configuración inicial Descargar los últimos payloads desde GitHub https://github.com/hak5/bashbunny-payloads Conectar Bash Bunny en modo Arming Mode (“Switch Position 3: Arming Mode) y copiar el contenido de GitHub en Bash Bunny. Welcome & Updating the Bash Bunny Software —————————————————————————– Congratulations on your new Bash Bunny by Hak5! For the best experience, we recommend updating to the latest framework version and payload set from the downloads section of https://www.bashbunny.com. There you will find a wealth of knowledge and a helpful community of creative penetration testers and IT professionals. Welcome! Instalar “Tools Installer for Bash Bunny” Conectar Bash Bunny en modo Arming Mode […]