I penetrate things (phrasing). When I'm tired of penetrating (phrasing), I code. It's a vicious cycle. Red teamer at @BHinfoSecurity, founder of @porchetta_ind
Operating from a restricted environment without outbound connectivity? Venom allows for port reuse and even works on Windows (to my surprise). Now you can set up a SOCKS proxy without disturbing the original service!
Check it out 👉github.com/Dliv3/Venom
Coming Soon: a modularized REST/SPA driven brute force system that manages all aspects of password attacks.
- built on BruteLoops (multiprocessed)
- modules are simple Python packages
- upload input files; push values to multiple attacks
- insert new records without pausing
We are so grateful for the outpouring of support from everyone who is contributing to Signal's ongoing operation and development. We're a 501c3 nonprofit and we couldn't do this without you.
If you are on the fence about donating, you can give in here:
signal.org/donate/
Having discovered various issues with Windows mini-filter drivers lately I found public information about how to analyze such drivers for security issues somewhat lacking. Therefore today I've put out a blog post to try and fix that glitch :-) googleprojectzero.blogspot.c…
Just finished a long project I was working on.
It's a self developed remote access tool.
Shoutout to: @chvancooten, @ShitSecure for helping me with the last piece of the puzzle.
And : @byt3bl33d3r with his amazing OffensiveNim repo.
github.com/byt3bl33d3r/Offen…