-
Hi, I'm trying to port the tool to pentoo and have some mess to clean up.
You keep system (database) configuration files in user's ~/.owtf folder and write results to a current folder which becomes s…
-
You can follow this tutorial to inject a meterpreter DLL using FuzzBunch:
http://www.hackingtutorials.org/exploit-tutorials/exploiting-eternalblue-for-shell-with-empire-msfconsole/
It would be nic…
timwr updated
7 years ago
-
I am new to Git and the last instance on this update said to open an issue if I am running BackBox and the update didn't recognize that I was, which is what happened. I tried uploading the log of the…
-
## Steps to reproduce
How'd you do it?
1. Use the wp_wysija_newsletters_upload exploit
2. With the payload php/meterpreter/reverse_tcp the exploit works (on a lab vulnerable wordpress)
3. With the pa…
-
Hello, im having problems recompiling apks using apktool when i try to recompile it gives me this errors...
```
┌─[root]@[none]─[~/Desktop/apkR]
└──╼ $ apktool b facebook -o face.apk
00:50:37 up 22 …
-
## Expected Behavior
Plugin is meant to run with the use of metasploit
## Current Behavior
When using any metasploit plugins they fail.
Metasploit pro is installed on the machine so edited the tool…
-
```
What steps will reproduce the problem?
1. pyrit -r wpapsk-linksys.dump.gz -i dict.gz -b 00:0b:86:c2:a4:85
attack_passthrough
2. Gives Error: Scapy 2.x is required to use Pyrit's analyze/attack fu…
-
There is necessity to create a EscapeMode none, because are situations that force escape is not good, how the problem that I have, I need converter without espace the javascript token "&&".
-
```
What steps will reproduce the problem?
1. pyrit -r wpapsk-linksys.dump.gz -i dict.gz -b 00:0b:86:c2:a4:85
attack_passthrough
2. Gives Error: Scapy 2.x is required to use Pyrit's analyze/attack fu…
-
```
What steps will reproduce the problem?
1. pyrit -r wpapsk-linksys.dump.gz -i dict.gz -b 00:0b:86:c2:a4:85
attack_passthrough
2. Gives Error: Scapy 2.x is required to use Pyrit's analyze/attack fu…