When running phishing simulations, ensuring emails land in the inbox—not spam—is critical. Here are two must-have tools:
You are not allowed to view links. Register or Login to view. – Detects spam trigger words to optimize email content for better deliverability. You are not allowed to view links. Register or Login to view. – Provides a detailed spam score and analyzes your sending IP, mail server, and email configuration.
Use these tools to refine your phishing campaigns and maximize engagement!
LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs. It retrieves open ports, hostnames, tags, and vulnerabilities for a given IP and fetches CVE details, including affected products and CVSS scores. Results are color-coded by severity for easy analysis.
Features
Fetch open ports, hostnames, and associated vulnerabilities for an IP address.
Retrieve CVE details including severity levels.
Color-coded output for easy identification of risk levels.
Support for file input (-f) and output saving (-o).
Shadow Repeater monitors your Repeater requests and identifies which parameters you're changing. It then extracts the payloads you've placed in these parameters, and sends them to an AI model which generates variants. Finally, it attacks the target with these payload variations and uses response diffing to identify whether any of them triggered a new interesting code path. This approach allows it to build on a manual tester's expertise to uncover unexpected behaviors, such as unconventional You are not allowed to view links. Register or Login to view. vectors, successful You are not allowed to view links. Register or Login to view. attempts, and even novel vulnerabilities like email splitting attacks.
You can get the source code for You are not allowed to view links. Register or Login to view. and it's available on the BApp store.
Reference : You are not allowed to view links. Register or Login to view.
Shodan Dorks Generator : You are not allowed to view links. Register or Login to view.
Google Dorks Generator : You are not allowed to view links. Register or Login to view.
Github Dorks Generator : You are not allowed to view links. Register or Login to view.
DorkGPT (Generate Google Dorks with AI) : You are not allowed to view links. Register or Login to view.
Google Dorks for Bug Bounty : You are not allowed to view links. Register or Login to view.
AI HTTP ANALYZER is an advanced security analysis assistant integrated into Burp Suite. It examines HTTP requests and responses for potential security vulnerabilities such as SQL injection, XSS, CSRF, and other threats. The extension provides focused technical analysis, including quick identification of detected vulnerabilities, clear technical steps for exploitation, and PoC examples and payloads where applicable.
Features
Analyze HTTP requests and responses for security vulnerabilities
This post delves into the mechanics of a Performance Counter DLL PoC, designed to exploit CVE-2025-21293. The vulnerability hinges on misconfigured permissions in the "Network Configuration Operators" group, allowing for arbitrary performance counter registration and code execution with elevated privileges.
The Basic Structure of a Performance Counter DLLTo create a performance counter DLL, you must implement three key exported functions:
OpenPerfData: Initializes the performance counter.
CollectPerfData: Gathers performance data.
ClosePerfData: Cleans up resources when the counter is no longer in use.
// Example implementation of the Open function
DWORD APIENTRY OpenPerfData(LPWSTR pContext)
{
return ERROR_SUCCESS; // Initialization logic would go here
}
// Example implementation of the Collect function
DWORD APIENTRY CollectPerfData(LPWSTR pQuery, PVOID* ppData, LPDWORD pcbData, LPDWORD pObjectsReturned)
{
return ERROR_SUCCESS; // Data collection logic would go here
}
// Example implementation of the Close function
DWORD APIENTRY ClosePerfData()
{
return ERROR_SUCCESS; // Cleanup logic would go here
}
// DLL Entry Point
extern "C" BOOL WINAPI DllMain(HINSTANCE const instance, DWORD const reason, LPVOID const reserved)
{
switch (reason)
{
case DLL_PROCESS_ATTACH:
break; // Initialization when DLL is loaded
case DLL_THREAD_ATTACH:
break; // Optional thread initialization
case DLL_THREAD_DETACH:
break; // Optional thread cleanup
case DLL_PROCESS_DETACH:
break; // Cleanup when DLL is unloaded
}
return TRUE;
}
Enhancing the DLL with Logging for Proof of Concept
To validate the exploit, logging functions are incorporated to capture the execution context of each function call. This logging helps confirm whether the DLL runs under elevated privileges (like SYSTEM).
Code:
#include <iostream>
#include <Windows.h>
#include <Lmcons.h> // For UNLEN and GetUserName
#include <tlhelp32.h> // For CreateToolhelp32Snapshot
#include <strsafe.h>
Log: Captures execution context details like process ID, parent process ID, username, and command line.
LogToFile: Writes the captured data to a specified log file (C:\\LOGS\\RpcEptMapperPoc.log).
Execution Context Validation:
When a performance counter consumer (like WMI) queries this DLL, the logged output verifies that the DLL functions are executed in a high-privilege context, proving the elevation of privilege.
Registry Mapping:
The DLL is registered in the Windows registry under performance counter keys, allowing Windows to load and execute it when the counter is queried.