Posts

Showing posts with the label Microsoft

Shellphish - Phishing Tool For Xviii Social Media (Instagram, Facebook, Snapchat, Github, Twitter...)

Image
Phishing Tool for xviii social media: Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Gitlab, Pinterest. This script uses unopen to webpages generated past times SocialFish Tool ( https://github.com/UndeadSec/SocialFish ) Instagram webpage generated past times An0nUD4Y (@its_udy) ( https://github.com/An0nUD4Y ) Phishing Tool for Instagram, Facebook, Twitter, Snapchat, Github, Yahoo, Protonmail, Google, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Pinterest +1 customizable Features: Port Forwarding using Ngrok or Serveo Legal disclaimer: Usage of Shellphish for attacking targets without prior usual consent is illegal. It's the terminate user's responsibleness to obey all applicable local, acre too federal laws. Developers assume no liability too are non responsible for whatsoever misuse or impairment caused past times this prog...

Rdpscan - A Quick Scanner For The Cve-2019-0708 Bluekeep Vulnerability

Image
This is a quick-and-dirty scanner for the CVE-2019-0708 vulnerability inward Microsoft Remote Desktop. Right now, at that topographic point are well-nigh 900,000 machines on Blue Planet Internet vulnerable to this vulnerability, thence many are to await a worm presently similar WannaCry together with notPetya. Therefore, scan your networks together with spell (or at least, enable NLA) on vulnerable systems. This is a command-line tool. You tin download the source together with compile it yourself, or you lot tin download i of the pre-compiled binaries for Windows or macOS from the link above. This tool is based exclusively on the rdesktop spell from https://github.com/zerosum0x0/CVE-2019-0708 . Primary use To scan a network, run it similar the following: rdpscan 192.168.1.1-192.168.1.255 This produces i of 3 results for each address: SAFE - if target has determined bot travel patched or at to the lowest degree require CredSSP/NLA VULNERABLE - if the target has...