MobilePassThrough
Sn1per
Our great sponsors
MobilePassThrough | Sn1per | |
---|---|---|
8 | 5 | |
168 | 7,517 | |
- | - | |
1.8 | 6.1 | |
about 2 years ago | 26 days ago | |
Shell | Shell | |
- | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
MobilePassThrough
-
About UEFI support for NVIDIA 30xx series of MXM laptop GPUs.
script for my laptop(auto configs for GPU passthrough on qemu): https://github.com/T-vK/MobilePassThrough
-
GTX 1060m passthrough, advice?
i use this one btw:https://github.com/T-vK/MobilePassThrough/tree/3e35715cd06ae8f6f6c51f3ed58da892e67ec193 to install bumblebee + nvidia
-
Connecting display to laptop 3DController(muxless gpu), no physical connection
Script i used: https://github.com/T-vK/MobilePassThrough
- Gaming on Fedora 34: Windows 10 host on Vbox or Gnome Boxes? GPU passthrough
-
Is it possible to create a Windows VM with GPU Passthrough on the Acer Predator Triton 300 ?
For those who are running Fedora or Ubuntu it exists a wonderful project named MobilePassThrough by T-vK on GitHub that install the VM for you but also can do a compatibility check for it. All you have to do is clone the repo, and run their command like so:
-
Is the Acer Predator Triton 300 laptop compatible to do a GPU Passthrough ?
If you have this one but didn't try a dGPU Passthrough, you can use this: https://github.com/T-vK/MobilePassThrough
-
[Experiences][Potentially a guide] GVT + dGPU passthrough on a laptop (Thinkpad P50 - Muxed)
Other main sources I used (there are many more but I would be making a list longer than the post itself): - https://github.com/T-vK/MobilePassThrough - https://wiki.archlinux.org/index.php/Intel_GVT-g - https://gist.github.com/Misairu-G/616f7b2756c488148b7309addc940b28 - https://github.com/jscinoz/optimus-vfio-docs - https://www.reddit.com/r/VFIO/comments/8gv60l/current_state_of_optimus_muxless_laptop_gpu/ - https://www.reddit.com/r/VFIO/comments/ebo2uk/nvidia_geforce_rtx_2060_mobile_success_qemu_ovmf/ - https://www.win-raid.com/t892f16-AMD-and-Nvidia-GOP-update-No-requests-DIY.html - https://github.com/joeknock90/Single-GPU-Passthrough - more to comeTM
Sn1per
-
Surface management tools
For now the best tool I have found is this one: https://github.com/1N3/Sn1per
-
somone please help me improving my log file nom Parser code?
Starting PostgreSQL 13 database server: main. [94m[*][0m Loaded configuration file from /usr/share/sniper/sniper.conf [94m[[0m[92mOK[0m[94m][0m [94m[*][0m Loaded configuration file from /root/.sniper.conf [94m[[0m[92mOK[0m[94m][0m [94m[*][0m Saving loot to /usr/share/sniper/loot/workspace/nosva [94m[[0m[92mOK[0m[94m][0m [94m[*][0m Scanning 192.158.1.38 [94m[[0m[92mOK[0m[94m][0m [91m ____ [0m [91m _________ / _/___ ___ _____[0m [91m / ___/ __ \ / // __ \/ _ \/ ___/[0m [91m (__ ) / / // // /_/ / __/ / [0m [91m /____/_/ /_/___/ .___/\___/_/ [0m [91m /_/ [0m [93m + -- --=[ https://sn1persecurity.com[0m [93m + -- --=[ Sn1per v9.0 by u/xer0dayz[0m [92m====================================================================================[0m•x[92m[2022-08-22](15:56)[0mx• [91m RUNNING SC0PE WEB VULNERABILITY SCAN [0m [92m====================================================================================[0m•x[92m[2022-08-22](15:56)[0mx• P5 - INFO, CSP Not Enforced, http://192.158.1.38/, P2 - HIGH, Clear-Text Protocol - HTTP, http://192.158.1.38/, HTTP/1.1 200 OK P4 - LOW, Clickjacking HTTP, http://192.158.1.38/, P5 - INFO, CSP Not Enforced, https://192.158.1.38:443/, [92m====================================================================================[0m•x[92m[2022-08-22](15:56)[0mx• [91m RUNNING SC0PE NETWORK VULNERABILITY SCAN [0m [92m====================================================================================[0m•x[92m[2022-08-22](15:56)[0mx• P5 - INFO, Interesting Ports Found, 192.158.1.38, 21 8080 9090 7070 [92m====================================================================================[0 m•x[92m[2022-08-22](15:56)[0mx• ==================================================================================== •?((¯°·..• Sc0pe Vulnerability Report by u/xer0dayz •._.·°¯))؟• ==================================================================================== Critical: 0 High: 1 Medium: 0 Low: 1 Info: 2 Score: 8 ==================================================================================== P2 - HIGH, Clear-Text Protocol - HTTP, http://192.158.1.38:80/, HTTP/1.1 200 OK P4 - LOW, Clickjacking HTTP, http://192.158.1.38:80/, P5 - INFO, CSP Not Enforced, http://192.158.1.38:80/, P5 - INFO, CSP Not Enforced, https://192.158.1.38:443/, ==================================================================================== [92m====================================================================================[0m•x[92m[2022-08-22](15:56)[0mx• [91m SCAN COMPLETE! [0m [92m====================================================================================[0m•x[92m[2022-08-22](15:56)[0mx•
-
Are there any good automated attack tools besides Pentera?
Sn1per https://github.com/1N3/Sn1per
-
Tools for github recon?
Sniper All-in-one Pentesting tool
-
WebMap : A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generation during a Web Penetration Testing
This is awesome you have made your own tool a feat I have yet to do. If you are looking for pen-test automation you should check out Sn1per I love this tool.
What are some alternatives?
optimus-vfio-docs - Optimus (Non-MXM/Muxless/"3D Controller") passthrough testing notes
rengine - reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine's correlation, it just makes recon effortless.
Single-GPU-Passthrough
reconftw - reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
vfio - A script for easy pci and usb passthrough along with disks, iso's and other useful flags for quick tinkering with less of a headache. I use it for VM gaming and other PCI/LiveCD/PXE/VM/RawImage testing given the script's accessibility.
Vulnnr - Vulnnr - Vulnerability Scanner And Mass Exploiter, created for pentesting.
vbios_from_reg - Windows Registry VBIOS export script
nuclei-templates - Community curated list of templates for the nuclei engine to find security vulnerabilities.
gvt-linux
GhostRecon - Popular OSINT framework. Works fine with kali linux and other Debian-based systems. Coded this as a teen, so not really reliable for real researches.
passthrough_helper_void - GPU passthrough helper
LazyRecon - An automated approach to performing recon for bug bounty hunting and penetration testing.