⛓️💥 Notorious Smartphones malware, Known for its Remote Administration and Access tools, Which include Remote Device control and advanced Spyware functions. Penetrate iOS and Android, their Sandbox and SSL Security.
-
Updated
Sep 28, 2024 - C
⛓️💥 Notorious Smartphones malware, Known for its Remote Administration and Access tools, Which include Remote Device control and advanced Spyware functions. Penetrate iOS and Android, their Sandbox and SSL Security.
Automatic Injection attacks. Blind SQL, NoSQL, SQL, Blind GQL, GQL, Command, LDAP, Traversal, JNDI, JDBC, Esi, El, Etc. Clear mapping.
Kerberoasting ( Kerberos Attacks ). From networks or Domain controller log perspective, since 𝗖𝗿𝗮𝗰𝗞𝗲𝗿𝗕𝗹𝗶𝘁𝘇 implements many parts of the normal Kerberos protocol, the main detection method involves the use of rc4_hmac in Kerberos exchanges.
Abusive & Offensive ( 7R0J4N ) remote access for any smartphones, most advance on Android. crowdown is software that gives a person full control of another phones, remotely.
Release Neo, the Evil Ducky scripts into any Hardware or drive and watch that Devices burn.
encrypting directory and access. If the attackers find a 'scripts' that execute the commands based on external inputs, they might exploit it to gain RCE.
Decompiled pegasus spyware. NSO Group Technologies
Automated Exploit scanners for public Cameras, CCTV's, Devices Cam, Etc. Exploitation tool, Trust Attacks.
Add a description, image, and links to the trust-attack topic page so that developers can more easily learn about it.
To associate your repository with the trust-attack topic, visit your repo's landing page and select "manage topics."