Stolen NSA “Windows Hacking Tools” Now Up For Sale!

The Shadow Brokers who previously stole and leaked a portion of the NSA hacking tools and exploits is back with a Bang!

The hacking group is now selling another package of hacking tools, “Equation Group Windows Warez,” which includes Windows exploits and antivirus bypass tools, stolen from the NSA-linked hacking unit, The Equation Group.

For those unfamiliar with the topic, The Shadow

Continue reading Stolen NSA “Windows Hacking Tools” Now Up For Sale!

Stolen NSA “Windows Hacking Tools” Now Up For Sale!

The Shadow Brokers who previously stole and leaked a portion of the NSA hacking tools and exploits is back with a Bang!

The hacking group is now selling another package of hacking tools, “Equation Group Windows Warez,” which includes Windows exploits and antivirus bypass tools, stolen from the NSA-linked hacking unit, The Equation Group.

For those unfamiliar with the topic, The Shadow

Continue reading Stolen NSA “Windows Hacking Tools” Now Up For Sale!

nishang – PowerShell For Penetration Testing

Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for penetration testing, offensive security and red teaming. Nishang is useful during all phases of penetration testing. Usage Import all the scripts in the… Continue reading nishang – PowerShell For Penetration Testing

mimikittenz – Extract Plain-Text Passwords From Memory

mimikittenz is a post-exploitation powershell tool that utilizes the Windows function ReadProcessMemory() in order to extract plain-text passwords from various target processes. The aim of mimikittenz is to provide user-level (non-admin privileged) sen… Continue reading mimikittenz – Extract Plain-Text Passwords From Memory

Warning! This Cross-Platform Malware Can Hack Windows, Linux and OS X Computers

Unlike specially crafted malware specifically developed to take advantage of Windows operating system platform, cyber attackers have started creating cross-platform malware for wider exploitation.

Due to the rise in popularity of Mac OS X and other Wi… Continue reading Warning! This Cross-Platform Malware Can Hack Windows, Linux and OS X Computers

PowerOPS – PowerShell Runspace Portable Post Exploitation Tool

PowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell “easier”. PowerOPS is an application written in C# that does not rely on powershell.exe but runs PowerShell commands and functions within a powershell runspace environment (.NET). It intends to include multiple offensive PowerShell modules to…

Read the full post at darknet.org.uk

Continue reading PowerOPS – PowerShell Runspace Portable Post Exploitation Tool

Oops! Microsoft Accidentally Leaks Backdoor Keys to Bypass UEFI Secure Boot

It’s True — There is no such backdoor that only its creator can access.

Microsoft has accidentally leaked the Secret keys that allow hackers to unlock devices protected by UEFI (Unified Extensible Firmware Interface) Secure Boot feature.

What’s even worse?

It will be impossible for Microsoft to undo its leak.
<!– adsense –>
Secure Boot is a security feature that protects your device from

Continue reading Oops! Microsoft Accidentally Leaks Backdoor Keys to Bypass UEFI Secure Boot

Unicorn – PowerShell Downgrade Attack

Magic Unicorn is a simple tool for using a PowerShell downgrade attack to inject shellcode straight into memory. Based on Matthew Graeber’s PowerShell attacks and the PowerShell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18. Usage is simple, just run Magic Unicorn (ensure Metasploit is installed and in the…

Read the full post at darknet.org.uk

Continue reading Unicorn – PowerShell Downgrade Attack

The Backdoor Factory (BDF) – Patch Binaries With Shellcode

The Backdoor Factory or BDF is a tool which enables you to patch binaries with shellcode and continue normal execution exactly as the executable binary would have in its’ pre-patched state. Some executables have built in protection, as such this tool will not work on all binaries. It is advisable that you test target binaries […]

The post…

Read the full post at darknet.org.uk

Continue reading The Backdoor Factory (BDF) – Patch Binaries With Shellcode

Gdog – Python Windows Backdoor With Gmail Command & Control

Gdog is a stealthy Python Windows backdoor that uses Gmail as a command and control server, it’s inspired by Gcat and pushes a little beyond a proof of concept with way more features. And don’t forget, Gcat also inspired Twittor – Backdoor Using Twitter For Command & Control. Features Encrypted transportation messages (AES) + SHA256…

Read the full post at darknet.org.uk

Continue reading Gdog – Python Windows Backdoor With Gmail Command & Control