Sunday, 30 December 2018

Download Cheats PUBG MOBILE Tencent Gaming Buddy Aimbot Legit, Wallhack, No Recoil, ESP (Bonus V3 & File V2) 2019

Free Download Cheats PUBG MOBILE Tencent Gaming Buddy Aimbot Legit, Wallhack, No Recoil, ESP (Bonus V3 & File V2) Terbaru 2019


Download Cheats PUBG MOBILE


After Open Cheat (setelah membuka cheat) tekan F1

FITURE CHEATS PUBG MOBILE:

  • WALLHACKS
  • NO RECOIL
  • AIMBOT
  • ESP LINE
  • ESP HEALTH
  • ESP WEAPON
  • ESP RADAR
  • ESP DISTANCE
  • FULLHACK

TUTORIAL :
**Turn Off All Antivirus <<<
**Turn Off Windows Defender
**Install Vcredist 2008,2010,2013,2015 & 2017
**Install Netframe New 
**Install Direct 11

1. Open Tencent Gaming Buddy 
2. Click Setting (Check screenshot tutorial!)
free Download Cheats PUBG MOBILE
3. Select Basics - > Language -> change Chinese language
free Download Cheats PUBG MOBILE terbaru
4. Select Engine -> Click DirectX+
Download Cheats PUBG MOBILE terbaru 2019
5. Change HD 1080P
Download Cheats PUBG MOBILE wall hack
6. SAVE

~~~~~~~~~~NEXT~~~~~~~~~~~
1. Exit Tencent Gaming Buddy 

(Check icon on Taskbar (Richt Click and Exit)
2. Open Folder Locale 2.4.00
3. Right Click Run as Administrator LEInstaller.exe
4. Click Isntall for All Users and click Ok

5. Click "Edit Global profile list"
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
6. Change to Run in Japanese (ADMIN)
7. Check Location (Chinese (simplefied, PRC)
8. Check Advanced Options
~Click Run as ad administrator
~Click Fake Registry
~Cliick Show this profile in main menu

9. SAVE
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
NEXT -> Find Folder Tencent Gaming Buddy
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1. Find "AppMarket.exe", Example: ON MY PC D:\GAME\TxGameAssistant\AppMarket\
2. Right Click - Select - Run in Japanese (Admin)
3. Play PUBG Mobile on Tencent
4. Open Cit (When Waiting PLANE) / Saat menunggu pesawat!

Well Done!
free Download Cheats PUBG MOBILE anti banned


Video Tutorial:


TEST ON WINDOWS 10, 8, 7 WORK PERFECTLY!

LINK DOWNLOAD GOOGLE DRIVE:


Credit Web Hack China Server

CVE-2018-1002105: Kubernetes - Arbitrary Requests (Unauthenticated and Authenticated)

CVE-2018-1002105: Kubernetes - Arbitrary Requests (Unauthenticated and Authenticated)

EDB-ID: 46052 and 46053
Author: EVICT
Type: Remote
Published: 2018-12-10 (2018-12)
Platform: Multiple

About CVE-2018-1002105:
CVE-2018-1002105: Kubernetes - Arbitrary Requests (Unauthenticated and Authenticated)
   In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.

About EDB-ID-46052 (Unauthenticated):

About EDB-ID-46053 (Authenticated):


And have something to say about GitHackTools or CVE-2018-1002105? Comment below or share this post from GitHackTools FacebookGitHackTools Twitter and GitHackTools Google Plus.

From Exploit Database and NVD

EDB-ID-46057: Product Key Explorer 4.0.9 - Denial of Service (PoC)

EDB-ID-46057: Product Key Explorer 4.0.9 - Denial of Service (PoC)

EDB-ID: 46057
Author: T3JV1L
Type: Dos
Published: 2018-12-27 (2018-12)
Platform: Windows_x86

About Product Key Explorer:
   Product Key Explorer is a powerful product key finder solution for Windows, designed to help users find, recover and backup activation keys for +9000 popular software programs installed on local or network computers.

About EDB-ID-46057:



And have something to say about GitHackTools or CVE-2018-11529? Comment below or share this post from GitHackTools FacebookGitHackTools Twitter and GitHackTools Google Plus.

IMSI-catcher - Realtime Extracter for GMS Data, IMSI Numbers and more Info of Cellphones around you

USING AN RTL-SDR AS A SIMPLE IMSI CATCHER
Picture from t17lab
About IMSI-catcher
   This program shows you IMSI numbers, country, brand and operator of cellphones around you.
   /!\ This program was made to understand how GSM network work. Not for bad hacking ! :)

What you need: One computer, one USB DVB-T key (RTL2832U) with antenna (less than 15$) or a OsmocomBB phone or HackRF.

Install IMSI-catcher:
   For Ubuntu
   For Debian: Download IMSI-catcher
      1, Download and extract IMSI-catcher from http://bit.ly/2EXaNay
      2, Open IMSI-catcher-master folderand open Terminal in that folder.
      3, Enter this commands: sudo apt install python-numpy python-scipy python-scapy

   For Debian Testing and Ubuntu 18.04+: Read Installation - gr-gsm - Open Source Mobile Communications

   If gr-gsm failled to setup. Try this:

      Details in: Installation · ptrkrysik/gr-gsm Wiki · GitHub


Run ISMI-catcher:
1, Open 2 terminals in IMSI-catcher-master folder (You can download it here).
2, In terminal 1, enter sudo python simple_IMSI-catcher.py --sniff. In terminal 2, enter grgsm_scanner search a frequency to listen.
3, Next, ask grgsm_livemon to use one of these frequencies:
      grgsm_livemon -f <your_frequency>M
      Example: grgsm_livemon -f 938.2M

      It should start producing output like :
15 06 21 00 01 f0 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b
25 06 21 00 05 f4 f8 68 03 26 23 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b
49 06 1b 95 cc 02 f8 02 01 9c c8 03 1e 57 a5 01 79 00 00 1c 13 2b 2b
...
       You can change the frequency if you want.

Optional for IMSI-catcher
   Information about the cell tower: sudo python find_cell_id.py
   Get immediate assignment: sudo python immediate_assignment_catcher.py

Find frequencies
   You can either use the grgsm_scanner program from gr-gsm mentioned above, or fetch the kalibrate-hackrf tool like this:

   Run: gitkernel@hilda:-$ kal -s GSM900
kal: Scanning for GSM-900 base stations.
GSM-900:
chan:   14 (937.8MHz + 10.449kHz) power: 3327428.82
chan:   15 (938.0MHz + 4.662kHz) power: 3190712.41
...

Links
 * International Mobile Subscriber Identity — Wikipédia.
 * Setup of Gr-Gsm: Installation · ptrkrysik/gr-gsm Wiki · GitHub.

Saturday, 29 December 2018

CVE-2018-1160: Netatalk - Bypass Authentication

CVE-2018-1160: Netatalk - Bypass Authentication

EDB-ID: 46048
CVE: CVE-2018–1160
Author: TENABLE NS
Type: Remote
Published: 2018-12-21 (2018-12)
Platform: Multiple

Description about CVE-2018–1160:

   Netatalk before 3.1.12 is vulnerable to an out of bounds write in dsi_opensess.c. This is due to lack of bounds checking on attacker controlled data. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution.


And have something to say about GitHackTools or CVE-2018-11529? Comment below or share this post from GitHackTools FacebookGitHackTools Twitter and GitHackTools Google Plus.