Hi, I think that people here would be more interested by the (new?) techniques you're using in your tool than by your own (not documented?) implementation. ie: are you using MSF browser autopwn technique for browser control? (Or, will we have to spend individually 3 days to review and test your tool?) My 2 cts /JA Le 23/04/2012 21:52, runlvl a écrit : > Exploit Pack - Web Security Edition > > This tool allows you to take control of remote browsers, steal social > network credentials, obtain persistence on it, DDoS and more. > Demo: http://www.youtube.com/watch?v=B_AYyRFNokI > > Main features: > - Hacking of Gmail, Yahoo, Facebook, Live, Linkedin > - Session persistence > - 0day exploits included > - Remote browser control > - DDoS by creating botnets > - Launch remote exploits > - Steal credentials > > Questions? support@xxxxxxxxxxxxxxx > > Official site: http://exploitpack.com > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ -- Jerome Athias - NETpeas VP, Director of Software Engineer Palo Alto - Paris - Casablanca www.netpeas.com --------------------------------------------- Stay updated on Security: www.vulnerabilitydatabase.com "The computer security is an art form. It's the ultimate martial art."
Attachment:
smime.p7s
Description: Signature cryptographique S/MIME
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/