Jump to content


Active Members
  • Posts

  • Joined

  • Last visited

  • Days Won


Recent Profile Visitors

659 profile views

JPaulMora's Achievements


Newbie (1/14)

  1. Are you saying this needs to get injected directly to RAM? Could you point me to an example? isn't there a way to call it as a java function?
  2. Hey guys, I have a JAVA project and I want to add this msfvenom payload to it, but I have no idea how to "execute" this buf. Anyone know how to do this? or is there any other option on injecting code ? --the payload was generated with './msfvenom -p osx/x64/say TEXT="it works" -f java' thanks. buf = new byte[] { (byte) 0x48, (byte) 0x31, (byte) 0xc0, (byte) 0xb8, (byte) 0x3b, (byte) 0x00, (byte) 0x00, (byte) 0x02, (byte) 0xe8, (byte) 0x16, (byte) 0x00, (byte) 0x00, (byte) 0x00, (byte) 0x2f, (byte) 0x75, (byte) 0x73, (byte) 0x72, (byte) 0x2f, (byte) 0x62, (byte) 0x69, (byte) 0x6e, (byte) 0x2f, (byte) 0x73, (byte) 0x61, (byte) 0x79, (byte) 0x00, (byte) 0x69, (byte) 0x74, (byte) 0x20, (byte) 0x77, (byte) 0x6f, (byte) 0x72, (byte) 0x6b, (byte) 0x73, (byte) 0x00, (byte) 0x48, (byte) 0x8b, (byte) 0x3c, (byte) 0x24, (byte) 0x4c, (byte) 0x8d, (byte) 0x57, (byte) 0x0d, (byte) 0x48, (byte) 0x31, (byte) 0xd2, (byte) 0x52, (byte) 0x41, (byte) 0x52, (byte) 0x57, (byte) 0x48, (byte) 0x89, (byte) 0xe6, (byte) 0x0f, (byte) 0x05 };
  3. not really, Pyrit's modular nature lets you update either side of the code wether its a GPU module or the main module. so other than a warning about different module versions, rebuilding Pyrit's core should get you updated (as the GPU modules haven't been updated).
  4. I agree that clustering is a very important feature, based on my testing and your tested speeds, I would recommend a wired network. WiFi is simply not fit for the task when it comes to transferring GBs of data really fast, even having one of those 12MB/s WiFi routers, this is pretty slow when you need to transfer huge wordlists back and forth over LAN. I might add a tutorial on the GitHub wiki referring to this topic.
  5. Yes, ATM there hasn't been discovered any 'universal' weakness to WPA/WPA2 other than bruteforcing the PSK. So as Cooper mentioned, this is just a specialized version of a GPU+CPU cracker with the advantage of storing whatever you have already computed.
  6. Version 0.5.0 is out! go ahead and grab a copy! Added CUDA and OpenCL switch in config plus now you can run pyrit completely on GPU! Note: if you have used pyrit previously, delete/backup your config file at ~/.pyrit/config as the program must recreate it.
  7. Pyrit WPA password cracker updated! Ive been maintaining this project for a while now, please spread the word: https://github.com/JPaulMora/Pyrit Added some extra options and performance improvements.
  8. Just added the license notice, forgot to do it when cloning (it has always been open source) but now its official!
  9. Thats right, you may not be pressing yes in the confirmation window, you may wanna check my Ultimate version of bypass-UAC It should work on almost any windows computer, even the ones with the confirmation window disabled. https://github.com/JPaulMora/BypassUAC Also, remember you got the REPEAT command (Zeta's example is great) and you should note that when using it, the first command is not executed. ie. DOWNARROW REPEAT 3 equals DOWNARROW DOWNARROW DOWNARROW and not DOWNARROW DOWNARROW DOWNARROW DOWNARROW
  10. Already added a section on how to submit character mappings, check the github repo for updates you can go ahead and clone the source and give it a try, tell me if you find any bugs or if you have ideas on improvements Thanks
  11. Ever wanted to know whats inside all of those saved bins? forgot what your payload did and is too risky to try? check out my python scrip to decode them at: https://github.com/JPaulMora/Duck-Decoder help is much appreciated! need support for non-english keyboards. run it without args for help. Fully tested & working on OS X 10.10.3
  • Create New...