RapidRepoPull – Tool To Quickly Pull And Install Repos From A List

DescriptionThis program uses Python to clone/maintain multiple security related repos using threading and multiprocessingGoalThe goal of this program is to quickly pull and install repos from its listUse casesQuickly install your favorite Security repos on a new system Kick off multiple concurrent git clone tasks utilizing Python Add remove repos to the worker_data list as needed in order to address indivudual use case/project needs RequirementsThis program was tested with Python version 3.7.2 64-bit Ensure the Python3 virtual environment package is installed (Ubuntu) sudo apt-get install python3-venv Ensure git is installed (Ubuntu) sudo apt-get install git Usage Option 1 Automatic (Docker)Clone code repo git clone https://github.com/tbalz2319/RapidRepoPull.git Change directory into RapidRepoPull cd RapidRepoPull The script will run in a minimal Alpine Docker container (126 MB) and extract the dirs in the current working dir docker-compose up –build Usage Option 2 Local InstallClone code repo git clone https://github.com/tbalz2319/RapidRepoPull.git Change directory into RapidRepoPull cd RapidRepoPull Execute the script below ./install.sh Usage Option 3 ManualClone code repo git clone https://github.com/tbalz2319/RapidRepoPull.git Change directory into RapidRepoPull cd RapidRepoPull Create a virtual Python3 environment to run this code python3 -m venv venv Activate the virual enivornment source venv/bin/activate Install requirements pip install -r requirements.txt Run program python3 rapid.py Update ProgramRun the following script ./update.sh Mass Update all existing reposRun the command to maintain all existing repos by attempting to pull latest version ./update_repos.shDownload RapidRepoPull

Link: http://www.kitploit.com/2019/03/rapidrepopull-tool-to-quickly-pull-and.html

OSX Exploitation with Powershell Empire

This article is another post in the empire series. In this article, we will learn OSX Penetration testing using empire. Table of Content Exploiting MAC Post Exploitation Phishing Privilege Escalation Sniffing Exploiting MAC Here I’m considering you know PowerShell Empire’s basics, therefore, we will create the listener first using the following commands: [crayon-5c931df0cb99c925497913/] Executing the… Continue reading →
The post OSX Exploitation with Powershell Empire appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/osx-exploitation-with-powershell-empire/

March 2019 Sourcetree Advisory – Multiple Remote Code Execution Vulnerabilities

Posted by Erin Jensby on Mar 20This email refers to the advisory found at
https://confluence.atlassian.com/display/SOURCETREEKB/Sourcetree+Security+Advisory+2018-03-06
.

CVE ID:

* CVE-2018-17456.
* CVE-2018-20234.
* CVE-2018-20235.
* CVE-2018-20236.

Product: Sourcetree.

Affected Sourcetree product versions:

1.2 <= version < 3.1.1 0.5a <= version < 3.0.17 Fixed Sourcetree product versions: * for macOS, Sourcetree 3.1.1 has been released with a fix for these...

Link: http://seclists.org/bugtraq/2019/Mar/30