Showing posts with label multi. Show all posts
Showing posts with label multi. Show all posts
Friday, March 31, 2017
Download Windows 10 PRO AIO DUAL BOOT UEFI OEM MULTi 7 Nov 2016 Gen2
Download Windows 10 PRO AIO DUAL BOOT UEFI OEM MULTi 7 Nov 2016 Gen2
[ RELEASE INFO ]
File: W10.DUAL.OEM.M7.NOV2016.iso
Size: 6,93GB
Format: Bootable ISO
CRC32: 92eebc6d
MD5 : d75cdf9bd18997be74bb18f2944454d2
SHA-1: 614ebf44a378035dc4232d480eae2e480049debb

[ SOURCES ]
32bit:
SW_DVD5_Win_Pro_10_1607_32BIT_English_MLF_X21-07253
64bit:
SW_DVD5_Win_Pro_10_1607_64BIT_English_MLF_X21-06988
[ CONTENTS ]
Integrated:
Servicing Stack Update:
KB3199986
Cumulative Update:
KB3200970
Dynamic Update (for boot.wim (index 2) and winre.wim):
KB3194623
Dynamic Update (for updating Installation Media):
KB3203338
Security Update (Flash Player for IE):
KB3167685
.NET Framework 3.5
Setupcomplete / Post-install:
Defender Updates
[ LANGUAGES ]
BRAZILIAN
ENGLISH
DUTCH
POLISH
PORTUGUESE
RUSSIAN
TURKISH
[ FEATURES ]
Dual-Boot Setup
UEFI-ready
(Use attached Rufus USB-tool to make UEFI-bootable)
install.wim(s) compressed to recovery format install.esd(s)
Diagnostics and Recovery Toolset 10.0 (x86 & x64)
[ EDITIONS INCLUDED ]
32bit:
Windows 10 Pro - STD
Windows 10 Pro - KMS
Windows 10 Pro - OEM
64bit:
Windows 10 Pro - STD
Windows 10 Pro - KMS
Windows 10 Pro - OEM
STD = Standard installation
KMS = Activated by KMS
OEM (Original Equipment Manufacturer) will automatically
activate original version installed by Manufacturer.
[ INSTALLATION & INFORMATION ]
Create bootable USB, minimum 8GB (highly recommended),
with Rufus (attached) or burn to DVD-DL at slow speed.
File: W10.DUAL.OEM.M7.NOV2016.iso
Size: 6,93GB
Format: Bootable ISO
CRC32: 92eebc6d
MD5 : d75cdf9bd18997be74bb18f2944454d2
SHA-1: 614ebf44a378035dc4232d480eae2e480049debb

[ SOURCES ]
32bit:
SW_DVD5_Win_Pro_10_1607_32BIT_English_MLF_X21-07253
64bit:
SW_DVD5_Win_Pro_10_1607_64BIT_English_MLF_X21-06988
[ CONTENTS ]
Integrated:
Servicing Stack Update:
KB3199986
Cumulative Update:
KB3200970
Dynamic Update (for boot.wim (index 2) and winre.wim):
KB3194623
Dynamic Update (for updating Installation Media):
KB3203338
Security Update (Flash Player for IE):
KB3167685
.NET Framework 3.5
Setupcomplete / Post-install:
Defender Updates
[ LANGUAGES ]
BRAZILIAN
ENGLISH
DUTCH
POLISH
PORTUGUESE
RUSSIAN
TURKISH
[ FEATURES ]
Dual-Boot Setup
UEFI-ready
(Use attached Rufus USB-tool to make UEFI-bootable)
install.wim(s) compressed to recovery format install.esd(s)
Diagnostics and Recovery Toolset 10.0 (x86 & x64)
[ EDITIONS INCLUDED ]
32bit:
Windows 10 Pro - STD
Windows 10 Pro - KMS
Windows 10 Pro - OEM
64bit:
Windows 10 Pro - STD
Windows 10 Pro - KMS
Windows 10 Pro - OEM
STD = Standard installation
KMS = Activated by KMS
OEM (Original Equipment Manufacturer) will automatically
activate original version installed by Manufacturer.
[ INSTALLATION & INFORMATION ]
Create bootable USB, minimum 8GB (highly recommended),
with Rufus (attached) or burn to DVD-DL at slow speed.
Download from Here
Open downloaded file on Torrent
And enjoy
Go to link download
PwnStar Script for multi attack for all your fake AP needs!
PwnStar Script for multi attack for all your fake AP needs!

A bash script to launch a Soft AP, configurable with a wide variety of attack options. Includes a number of index.html and server php scripts, for sniffing/phishing. Can act as multi-client captive portal using php and iptables. Launches classic exploits such as evil-PDF. De-auth with aireplay, airdrop-ng or MDK3.
Usage
Basic Menu
1) Honeypot: get the victim onto your AP, then use nmap, metasploit etc
no internet access given
2) Grab WPA handshake
3) Sniffing: provide internet access, then be MITM
4) Simple web server with dnsspoof: redirect the victim to your webpage
5) Karmetasploit
6) Browser_autopwn
1) Relies on auto-connections ie the device connnects without the owner being aware. You can then attempt to exploit it. Target the fake-AP ESSID to something the device has likely connected to previously eg Starbucks WiFi
2) Sometimes it is quicker to steal the handshake than sniff it passively. Set up the AP with the same name and channel as the target, and then DOS the target. Airbase will save a pcap containing the handshake to /root/PwnSTAR-n.cap.
3) Provides an open network, so you can sniff the victims activities.
4) Uses apache to serve a webpage. There is an option to load your own page eg one you have cloned. The provided page (hotspot_3) asks for email details. Note the client is forced to the page by DNS spoofing. They can only proceed to the internet if you manually stop dnsspoof. DNS-caching in the client is a problem with this technique. The captive portal in the advanced menu is a much better way of hosting hotspot_3
5&6) Provides all the config files to properly set-up Karmetasploit and Browser_autopwn.
Advanced Menu
a) Captive portals (phish/sniff)
b) Captive portal + PDF exploit (targets Adobe Reader < v9.3)
c) MSXML 0day (CVE-2012-1889: MSXML Uninitialized Memory Corruption)
d) Java_jre17_jmxbean
e) Choose another browser exploit
a) Uses iptables rules to route the clients. This is a fully functioning captive portal, and can track and block/allow multiple connections simultaneously. Avoids the problems of dns-spoofing. There are two built-in web options:
1) Serves hotspot3. Does not allow clients onto the internet until credentials have been given.
2) Allows you to add a personal header to the index.php. You could probably copy the php functions from this page onto a cloned page, and load that instead.
b) A captive portal which blocks the client until they have downloaded a pdf. This contains a malicious java applet. Includes a virgin pdf to which you can add your own payload.
c&d) Launches a couple of example browser exploits
e) Gives a skeleton framework for loading any browser exploit of your choice. Edit PwnSTAR browser_exploit_fn directly for more control.
Download PwnStar
Go to link download
Wednesday, March 22, 2017
MLDonkey multi protocol P2P file sharing application
MLDonkey multi protocol P2P file sharing application

MLDonkey is a multi-platform and freely distributed eDonkey client, a P2P (Peer-to-Peer) file-sharing application. It provides users with both a server (daemon) and graphical user interface (GUI).
It seems to be the first ever open source application that could access the eDonkey peer-to-peer file sharing network, as a eDonkey2000 clone. It officially supports the Linux, BSD, Solaris, Mac OS X, MorphOS, and Microsoft Windows operating systems.
Currently, the application supports several large P2P networks, including Overnet, BitTorrent, Fasttrack (Kazaa, Imesh, Grobster), Gnutella (Bearshare, Limewire, etc), Gnutella2 (Shareaza), Soulseek, Opennap, and Direct-Connect (DC++).
Several user interfaces are available for this project, including web-based, native GUIs, Telnet based and basic Wap front-ends. The most simple and effective appears to be the Telnet interface accessible through the command-line (telnet 127.0.0.1 4000) or via the Putty application.
While the Wap interface is extremely simple and provides users only with very basic functionality, such as current download and upload speed, current running downloads, as well as pause, resume, and cancel functions, the web-based interface can be easily accessed with any modern web browser through http://admin@127.0.0.1:4080.
MLdonkey comes by default with a GTK interface. However, there are many open source or commercial GUI (Graphical User Interfaces) front-ends available, including Sancho, KMLdonkey, G2Gui, CocoDonkey, xDonkey, mlMac, Nulu GUI ML, MLdonkeyWatch, phpEselGui, saman, Platero, Alemula, Zuul, JMoule, Web-GMUI, and Rmldonkey.
All the aforementioned MLdonkey interfaces can be used both remotely and locally. Furthermore, it allows users to easily enable or disable P2P networks, perform parallel searches on all enabled peer-to-peer networks, as well as to download files concurrently from multiple clients.
Summing up, MLdonkey is a very powerful and popular P2P client that runs on most operating systems, supports a wide range of peer-to-peer networks, and comes with a plethora of user interfaces.
Features:
- 100% Open Source, GPL license
- runs on Linux, Unix, Solaris, MacOSX, MorphOS and Windows
- The p2p core can run on a resource limited headless computer, with remote GUI clients accessing it over the network.
- The core is built to run as daemon for days, weeks, ever...
- Several different GUIs available, some of them developed separately.
- Multi-user support: the same core can queue and process downloads for several different users who cant see what the others are downloading.
- Several different file-sharing networks supported:
- ED2K (and Kademlia and Overnet)
- BitTorrent
- DC++
- (FastTrack, SoulSeek, Gnutella and G2 need work)
- The core can download the same file from several different networks simultaneously.
- Scriptable command-line interface available. Its possible to control all aspects of mldonkey from the CLI.
- Written in ObjectiveCaml, with some parts written in C and some in Assembly.
Download MLDonkey
Go to link download
Monday, March 13, 2017
FuckShitUp Multi Vulnerabilities Scanner written in PHP
FuckShitUp Multi Vulnerabilities Scanner written in PHP

Basically, FSU is bunch of tools written in PHP-CLI. Using build-in functions, you are able to grab urls using search engines - and so, dork for interesting files and full path disclosures. Using list of urls, scanner will look for Cross Site Scripting, Remote File Inclusion, SQL Injection and Local File Inclusion vulnerabilities. It is able to perform mass bruteforce attacks for specific range of hosts, or bruteforce ssh with specific username taken from FPD. Whenever something interesting will be found, like vulnerability or broken auth credentials, data will be saved in .txt files - just like urls, and any other files. FSU is based on PHP and text files, its still under construction so i am aware of any potential bugs. Principle of operation is simple.
More urls -> more vulns. For educational purposes only.
Intro
- Data grabbing:
- URLs (geturl/massurl) -> (scan)
- Configs, Databases, SQLis (dork)
- Full Path Disclosures / Users (fpds) -> (brutefpds)
- Top websites info (top)
- Massive scanning
- XSS, SQLi, LFI, RFI (scan)
- FTP, SSH, DBs, IMAP (multibruter)
- Accurate SSH bruteforce (brutefpds)
Plan
- Web Apps
- Grab urls via geturl or massurl (massurl requires list of tags as file)
- Scan urls parameters for vulns with scan
- Servers
- Pick target, get ip range
- Scan for services on each IP and bruteforce with multibruter
- Grab full path disclosures, and so linux usernames
- Perform SSH bruteforce for specific user with brutefpds
- Info grabbing
- Use dork for automatic dorking
- Use fpds for full path disclosure grabbing
- Use search for searching someone in ur databases
- Use top for scanning all top websites of specific nation
- Others
- Stat shows actual statistics and informations
- Show display specific file
- Clear and filter - remove duplicates, remove blacklisted urls
Others
MultiBrtuer requirements (php5):
- php5-mysql - for mysql connections
- php5-pgsql - for postgresql connections
- libssh2-php - for ssh connections
- php5-sybase - for mssql connections
- php5-imap - for imap connections
TODO:
- Fix problems with grabbing large amount of urls
- More search engines
- SQL Injector
- RFI shell uploader
- FSU is not secure as it should be
Download FuckShitUp
Go to link download
Labels:
fuckshitup,
in,
multi,
php,
scanner,
vulnerabilities,
written
Subscribe to:
Posts (Atom)