Git Product home page Git Product logo

5l1v3r1's Projects

slides icon slides

Will try to put here slides from now on when I give a talk

slidesremote icon slidesremote

WIFI Presentation Remote - Control Power Point from your Phone

slidev icon slidev

Presentation Slides for Developers (Public Beta 🎉)

slidingrbf icon slidingrbf

RBF networks that imitate convolutional networks

slidr icon slidr

Easily add slide to dismiss functionality to an Activity

slient-doc-pdf-exploit-builder-fud-malware-cve icon slient-doc-pdf-exploit-builder-fud-malware-cve

Vulnerability Disclosure Timeline Closer inspection of the Exploit PDF content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit PDF from Python encrypted code content which we also implement in couple of our builders. Silent PDF Exploit silent-pdf-exploit-2018silent-pdf-exploit-2018 Silent PDF Exploit There are multiple Exploit PDF in Silent PDF Exploit, a package commonly used by web services to process Exploit PDF File. One of the vulnerabilities can lead to remote code execution (RCE) if you process user submitted PDF. The exploit for this vulnerability is being used in the wild.

slient-doc-pdf-exploit-builder-fud-malware-cve-1 icon slient-doc-pdf-exploit-builder-fud-malware-cve-1

Vulnerability Disclosure Timeline Closer inspection of the Exploit PDF content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit PDF from Python encrypted code content which we also implement in couple of our builders.

slient-doc-pdf-exploit-builder-fud-malware-cve-2 icon slient-doc-pdf-exploit-builder-fud-malware-cve-2

One of the most complex tasks for the cyber security expert is to ensure their malicious code goes detected by antivirus and achieves its goal. For this, they have invested a lot on more complex infection processes, going beyond the traditional Exploit PDF and using techniques where the malicious payload is hidden in encrypted

slient-doc-pdf-exploit-builder-fud-malware-cve-main icon slient-doc-pdf-exploit-builder-fud-malware-cve-main

ulnerability Disclosure Timeline Closer inspection of the Exploit PDF content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit PDF from Python encrypted code content which we also implement in couple of our builders. Silent PDF Exploit silent-pdf-exploit-2018silent-pdf-exploit-2018 Silent PDF Exploit There are multiple Exploit PDF in Silent PDF Exploit, a package commonly used by web services to process Exploit PDF File. One of the vulnerabilities can lead to remote code execution (RCE) if you process user submitted PDF. The exploit for this vulnerability is being used in the wild. Why Are You Disclosing A Exploit PDF We have collectively determined that these vulnerabilities are available to individuals other than the person(s) who discovered them. An unknowable number of people having access to these vulnerabilities makes this a critical issue for everyone using this software.

slient-url-exploit-new-cve-chrome-exploit-html-downloader-put-your-link icon slient-url-exploit-new-cve-chrome-exploit-html-downloader-put-your-link

URL Infection (Silent Java Drive By) URL Infection Exploit Silent Java Drive by downloads may happen when visiting a site, opening an e-mail message. It may even happen by clicking on a malicious pop-up window: by clicking on the window in the belief that it concerns an error report from the computer’s OS, for example. The next step is to host the malicious content that the attacker wishes to “share”. One option is for the attacker to host the malicious content on their own server. However, it’s rather difficult directing users to a new page, so an exposed legal website may also host it. Or even a legal website could be distributing the attackers’ content through a third party service without knowing it. When the client loads the content, the attacker will analyze the trace of the client in order to craft the code to URL Infection Exploit weak spots especially to that client. Finally, the attacker exploits the needful weak spots to launch the drive-by download attack.

slient-url-exploit-new-cve-chrome-exploit-html-downloader-put-your-link-1 icon slient-url-exploit-new-cve-chrome-exploit-html-downloader-put-your-link-1

URL Infection (Silent Java Drive By) URL Infection Exploit Silent Java Drive by downloads may happen when visiting a site, opening an e-mail message. It may even happen by clicking on a malicious pop-up window: by clicking on the window in the belief that it concerns an error report from the computer’s OS, for example.

slim icon slim

[WIP] web framework provides instant restful api for sql table.

slim-oauth2 icon slim-oauth2

Routes and Middleware for Using OAuth2 Server within a Slim Framework API

slimber icon slimber

Built upon Timber. Without performance penality.

slimpack icon slimpack

Toolkit for building encrypted file loaders for single source file NASM projects (uses AES-NI instructions)

slingshot.xss icon slingshot.xss

:collision: XSS script launcher to test for vulnerabilities Feel free to contribute!

slink icon slink

Alphanumeric Shellcode (x86) Encoder

slink-1 icon slink-1

SLink is a simple url shortener tool made with Flask (Python)

slipstream icon slipstream

NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by the victim visiting a website

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.