[Nulled] » Page 268

The Great Encyclopedia of Anonymity

You will need a Tor Browser!

The Hitchhiker's Guide is a service on the TOR network that is a very serious encyclopedia on anonymity, literally in all aspects, not only on the web. Such moments as: network operation (DNS, IP addresses and others), hardware identifiers, telemetry and OS, cryptocurrency transactions and a bunch of other sections are described in detail. Knowledge of English or the use of an interpreter is required. It is possible to download in PDF format.

All about privacy and anonymity.

Installing and using secure tools is one way to quickly and easily increase your privacy. Today, I will share with you a link to a useful repository where you can find hundreds of tools.:

##news Last Friday, Riot Games reported a hack: attackers stole the sources of League of Legends, Team fight Tactics and Packman anti-cheat software. The day before yesterday, the company announced that it refused to pay $10 million in ransom. Well, now the stolen 72 gigs of sources have been put up for auction with a starting price of a million dollars. 

 

Google's product, which is widely in demand among hackers from the point of view of exploitation - Chrome, has received regular updates.

Six security holes were fixed in Chrome 109, including four that were reported to Google by external researchers, for which they received $ 25,000.

And a new study from specialists from SpecterOps about read-only domain controllers (RODC) and pentest.

In short, having access to the KeePass configuration file, you can filter the stored passwords to your server in plain text.The trick is that you don't need to monitor when the user opens the manager.

BOF, to run in-memory PE files, not just DotNet assemblies. 

That's cool! The research discusses new methods for recovering NTLM hashes from encrypted credentials protected by CredGuard in Windows.

This tool was presented at Source Zero Com 2022. In short: you throw a compiled binary, tulza removes known Ios strings from the binary, signs with a certificate from another binary, well, and helps to bypass EDR (by increasing the file size)

Quite an interesting analysis on the example of Avast 

Next week, BlackHat Europe, and now new tulzas have already gone (or rather, a coolly redesigned old ones).

Many channels have already published ProxyNotShell PoC

New surprises in AD CS... Let's add the ESC11 technique🙈

Report: Cobalt Strike. Tactics of modern threats

What is TTL?

• TTL (Time To Live) is a special indicator in the header of an IP packet that determines the lifetime of the packet. It is needed to prevent loops in the network (So that the packet does not run in a circle, from one router to another).

Site Search

Site Menu


☑ Websites Scripts

Calendar

«    November 2024    »
MonTueWedThuFriSatSun
 123
45678910
11121314151617
18192021222324
252627282930 

Advertisement

Survey on the website

Evaluate the work of the site
 

Statistics

  • +8 Total articles 6747
  • +58 Comments 4125
  • +28 Users : 5879