4.59K subscribers
1.72K photos
233 videos
86 files
1.52K links
Download Telegram
Steganography is the art of hiding a secret message within a normal message. This is used to transfer some secret message to another person; with this technique, no one else in between will know the secret message you wanted to convey.

This art of hiding secret messages has been used for years in real-life communications. Since the evolution of digital communication, it has also been used in digital conversations.

https://github.com/W1LDN16H7/StegoCracker

#NULL🖤
https://t.me/Kali_Linux_NULL
Goblyn is a tool focused to enumeration and capture of website files metadata.

How it works?

Goblyn will search for active directories in the website and so enumerate the files, if it find some file it will get the metadata of file.

https://github.com/loseys/Goblyn

#NULL🖤
https://t.me/Kali_Linux_NULL
NULL
Photo
An all-in-one hacking tool written in .py to remotely exploit Android devices using ADB (Android Debug Bridge) and Metasploit-Framework.

Fox Note:
It seems to piggyback off of Metasploit
(Over the counter readily available hacking tool)
But it has many other options readily available as well so it claims, find out yourself. You know I’ll never condone or take responsibility for illegal behavior.

This tool can automatically Create, Install, and Run payload on the target device using Metasploit-Framework and ADB to completely hack the Android Device in one click if the device has open ADB port TCP 5555.
Tip
PhoneSploit Pro can also be used as a complete ADB Toolkit to perform various operations on Android devices over Wi-Fi as well as USB.

Features
v1.0
* Connect device using ADB remotely.
* List connected devices.
* Disconnect all devices.
* Access connected device shell.
* Stop ADB Server.
* Take screenshot and pull it to computer automatically.
* Screen Record target device screen for a specified time and automatically pull it to computer.
* Download file/folder from target device.
* Send file/folder from computer to target device.
* Run an app.
* Install an APK file from computer to target device.
* Uninstall an app.
* List all installed apps in target device.
* Restart/Reboot the target device to System, Recovery, Bootloader, Fastboot.
* Hack Device Completely :
* Automatically fetch your IP Address to set LHOST.
* Automatically create a payload using msfvenom, install it, and run it on target device.
And much more…

https://github.com/AzeemIdrisi/PhoneSploit-Pro

#NULL🖤
https://t.me/Kali_Linux_NULL
NULL
Photo
Uscrapper Vanta - Extract Open Source Intelligence from both Darknet and Surfacenet sources with ease and efficiency. Fast, reliable, and user-friendly, the ultimate choice for researchers and analysts.

Whats New?:
* Dark Web Support: Uscrapper Vanta now has the capability to handle .onion or dark web links. This expanded functionality enables users to extract crucial information from previously inaccessible sources, providing a more comprehensive view of the digital landscape.
* Keyword-Based Scraping: With the introduction of a new model, Uscrapper Vanta now allows users to scrape web pages for specific keywords or a list of keywords. This tailored approach enhances the tool’s versatility, enabling users to focus on extracting only the information relevant to their needs.

Uscrapper Vanta, Unleashing the Power of Open-Source Intelligence, dive deeper into the vast web with Uscrapper Vanta, Vanta unlocks a new level of data extraction capabilities, empowering the exploration of the uncharted territories of the dark web and uncovering hidden gems with pinpoint accuracy using the keyword extraction model. Uscrapper Vanta retains the core strengths of its predecessor, It can be used to Harvest a wealth of personal information, including email addresses, social media links, author names, geolocations, phone numbers, and usernames, from both hyperlinked and non-hyperlinked sources. Leveraging multithreading and sophisticated anti-web scraping defenses with advanced modules, ensuring you can access the data you require, Vanta supports ‘crawl and scrape’ within the same domain, gathering information from every relevant corner of a website, Generates comprehensive reports to organize and analyze the extracted data, turning raw information into actionable insights.

https://github.com/z0m31en7/Uscrapper

#NULL🖤
https://t.me/Kali_Linux_NULL
اینم پریدن یه دختر بنام المیرا❤️

نکته:تو گپ شاخ شد اینجور آدما جاشون مجازی نی

@elmirakiyan
آیدی فرد
برای خرید روش پیوی بنده💚
@Radkor_report


#NULL🖤
https://t.me/Kali_Linux_NULL
Azemux

It is a single tool that combines a variety of tools that may be needed. It currently supports only Azerbaijani and English languages.

More Info
https://github.com/ByFragment/Azemux

#NULL🖤
https://t.me/Kali_Linux_NULL
Introducing Inject-EXE by
The provided Python program Inject-EXE.py allows you to combine a malicious executable with a legitimate executable, producing a single output executable. This output executable will contain both the malicious and legitimate executables.

Features:
- Malicious EXE into Legit EXE
- Bypass AV Detection
- Social Engineering
- Executable Packer

Link: https://github.com/malwarekid/Inject-EXE

#NULL🖤
https://t.me/Kali_Linux_NULL
NULL
Photo
BatCloak - Obfuscate and evade, this is a batch file obfuscator with antivirus evasion capabilities, made in C#.

Analyzing BatCloak’s Capabilities,

Effectivity
In the following sections, we identify and break down the main techniques that BatCloak employs to achieve FUD malware status.

Batch Scripting: Manipulating MS-DOS CMD Strings
To understand modern FUD-equipped batch obfuscators, it’s important to comprehend some underlying principles of Microsoft Disk Operating System command (MS-DOS CMD) string and variable manipulation.
Many modern batch obfuscation techniques are built on the use of simple underlying string and variable manipulation techniques, with its origins going as far back as the deployment of MS-DOS.

Exploring the MS-DOS Set Command
The set command is a Windows command-line command that allows operating systems to set, display, and modify environment variables. It is one of the oldest commands shipped with Microsoft Windows as part of the operating system since MS-DOS was released.

Exploring MS-DOS Variable Concatenation
And much more…

Original is 404 not found, forked from ch5sh/BatCloak (https://github.com/ch5sh/BatCloak)

Go here instead👇🏻
https://github.com/Design-Enginnering/BatCloak

Reading material
https://www.trendmicro.com/content/dam/trendmicro/global/en/research/23/f/analyzing-the-fud-malware-obfuscation-engine-batcloak/tb-the-dark-evolution-advanced-malicious-actors-unveil-malware-modification-progression.pdf

Article
https://www.scmagazine.com/news/obfuscation-batcloak-80-percent-av-engines

#NULL🖤
https://t.me/Kali_Linux_NULL
Amateurs hack systems, professionals hack people, a quote by Bruce Schneier. CamHacker claims that through social engineering a successful photo will be captured and sent to you through phishing.

Perhaps this has some use oriented towards getting a positive ID on a target? Who knows, check it out yourself.

Features
* Three Templates
* Get IP, Location, Device type and Browser
* Concurrent double tunneling (Cloudflared and Loclx)
* Choose where to save images(custom directory)
* Error Diagnoser
* Argument support for templates, tunnelers and directory

More info👇🏻
https://github.com/KasRoudra2/CamHacker

#NULL🖤
https://t.me/Kali_Linux_NULL