The Hacking Library
351 subscribers
874 photos
19 videos
44 files
1.3K links
محتوي القناه هو عباره عن تجميع
القناه عباره عن ارشيف للهكرز الأخلاقيات وغير الأخلاقيين
استمتعوا😀👍
Download Telegram
Photos from National Cyber Security Services's post


Morpheus:-- Automated #Ettercap TCP/ #IP (MITM-hijacking Tool).

#Morpheus it's a Man-In-The-Middle (#MITM) suite that allows users to manipulate
#TCP/ #UDP data using #Ettercap, urlsnarf, msgsnarf, and tcpkill as backend applications.
but this tool main objective it's not to provide an easy way to #exploit/ #sniff targets,
but rather a call of attempting to TCP/UDP manipulations technics (etter filters)

Version release: v2.2 - STABLE
Author: Pedro #ubuntu [ r00t-3xp10it ]
Codename: Oneiroi Phobetor (The mithologic dream Greek god)
#Distros Supported: #Linux Ubuntu, #Kali, #Debian, #BackBox, #ParrotOS

#Download #Link:-

https://github.com/r00t-3xp10it/morpheus
Photos from National Cyber Security Services's post


Malcolm:-- #Malcolm is a #powerful, easily #deployable #network #traffic #analysis #tool suite for full #packet #capture artifacts (#PCAP files) and #Zeek logs.

Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind:-

1. Easy to use:– Malcolm accepts network traffic #data in the form of full packet capture (PCAP) files and Zeek (formerly Bro) logs. These artifacts can be uploaded via a simple browser-based interface or captured live and forwarded to Malcolm using lightweight forwarders. In either case, the data is #automatically normalized, #enriched, and correlated for analysis.

2. Powerful traffic analysis:– Visibility into network communications is provided through two intuitive interfaces: #Kibana, a flexible data #visualization plugin with dozens of prebuilt #dashboards providing an at-a-glance overview of network protocols; and Moloch, a powerful tool for finding and identifying the network #sessions #comprising suspected security incidents.

3. Streamlined deployment:– Malcolm operates as a cluster of #Docker containers, isolated #sandboxes which each serves a dedicated function of the #system. This Docker-based deployment model, combined with a few simple scripts for setup and run-time management, makes Malcolm suitable to be deployed quickly across a variety of platforms and use cases, whether it be for long-term deployment on a #Linux #server in a #security operations center (SOC) or for incident response on a #Macbook for an individual engagement.

4. Secure #communications:– All #communications with Malcolm, both from the user interface and from #remote log forwarders, are secured with industry-standard #encryption #protocols.

5. Permissive license:– Malcolm is comprised of several widely used open-source tools, making it an attractive alternative to security solutions requiring paid #licenses.

6. Expanding control systems visibility:– While Malcolm is great for general-purpose network traffic analysis, its creators see a particular need in the #community for tools providing insight into protocols used in industrial control systems (ICS) environments. Ongoing Malcolm development will aim to provide additional parsers for common #ICS protocols.

#Download #Link:-

https://github.com/idaholab/Malcolm
FUXI 2.0:-- #Penetration #Testing #Platform.

Installation:-
1. Depends on #Linux #python3 #redis #MongoDB
2. Create a configuration file instance/config.py Modify _config.py to config.py and
3. refine the configuration files such as redis and MongoDB

#Download #Link:-

https://github.com/jeffzh3ng/fuxi


FUXI 2.0:-- #Penetration #Testing #Platform.

Installation:-
1. Depends on #Linux #python3 #redis #MongoDB
2. Create a configuration file instance/config.py Modify _config.py to config.py and
3. refine the configuration files such as redis and MongoDB

#Download #Link:-

https://github.com/jeffzh3ng/fuxi
Photos from National Cyber Security Services's post


WordPress-PT:-- #Exploiting #Wordpress #vulnerabilities discovered via #WPScan.

Objective: Find, #analyze, recreate, and #document five vulnerabilities affecting an old version of WordPress.

Setup:-
1. #VirtualBox - #Virtual #machine #manager.
2. #Kali #Linux - #Attack #OS of choice.
3. #WPDistillery - Creating a locally hosted Wordpress #site.
4. #WPScan - #Vulnerability #scanner.

1. CVE-2018-6390 - Denial Of Service Overflow (#DOS)
2. CVE-2015-5622 - Cross-Site Scripting (#XSS)
3. CVE-2017-9061 - Error in Upload when the file's too large
4. CVE 2015-5714 - Shortcode Tags
5. CVE 2017-6817 - Authenticated XSS in #Youtube #URL Embeds

#Download #Link:-

https://github.com/bryanvnguyen/WordPress-PT
Photos from National Cyber Security Services's post


Onex v0.1:-- Onex is a #hacking #tool installer and package manager for #hackers. Onex is a library of all hacking tools for Termux and other #Linux distributions. onex can install any third-party tool or any hacking tool for you.

"onex a hacking tools library." Onex is a #kali Linux hacking tools installer for #termux and other Linux distribution. It's a package manager for hackers. onex manages large numbers of hacking tools that can be installed on a single click. Using onex, you can install all hacking tools in Termux and other Linux based distributions. onex can install more than 370+ kali Linux hacking tools. use onex install [tool_name] command to install any hacking tool.

onex works on any of the following operating systems:-
1. #Android (Using the Termux App)
2. Linux (Linux Based Systems)

#Download #Link:-

https://github.com/rajkumardusad/onex
Photos from National Cyber Security Services's post


DWKit:-- DWKit is a #Business #Process #Management #System based on .NET Core and React.

DWKit is a .NET BPM system made with simplicity and flexibility in mind. DWKit allows you to model, automate and execute mission-critical business processes, whatever #industry you’re operating in.

Features:-
1. Drag-&-drop form builder
2. Designer of workflow
3. User Interface on #React (JSX)
4. Role-based access control
5. #Admin panel
6. Support #MSSQL/ #PostgreSQL/ #Oracle #databases
7. Works fine on #Windows/ #Linux/ #MacOSX

#Download #Link:-

https://github.com/optimajet/DWKit
BugBountyToolkit:-- A multi-platform #bug #bounty #toolkit that can be installed on #Debian/ #Ubuntu or setup with #Docker.

Why should you use this #toolkit?
1. This toolkit offers a 3multiplatform base to work with as the script can be installed on #Linux, set up with Docker or installed on Windows with WSL (#Windows Subsystem for Linux).
2. The installer script can be customized to add or remove specific tools based on your requirements.
3. Tools are constantly being added, updated and fixed.

#Downlaod #Link:-

https://github.com/AlexisAhmed/BugBountyToolkit


BugBountyToolkit:-- A multi-platform #bug #bounty #toolkit that can be installed on #Debian/ #Ubuntu or setup with #Docker.

Why should you use this #toolkit?
1. This toolkit offers a 3multiplatform base to work with as the script can be installed on #Linux, set up with Docker or installed on Windows with WSL (#Windows Subsystem for Linux).
2. The installer script can be customized to add or remove specific tools based on your requirements.
3. Tools are constantly being added, updated and fixed.

#Downlaod #Link:-

https://github.com/AlexisAhmed/BugBountyToolkit
Pupy:-- #Pupy is an #opensource, #cross-platform (#Windows, #Linux, #OSX, #Android) #remote #administration and #post-#exploitation tool mainly written in #python.

Pupy is a cross-platform, multi-function #RAT and post-exploitation tool mainly written in python. It features an all-in-memory execution guideline and leaves a very low footprint. Pupy can communicate using multiple modes of #transport, migrate into #processes using reflective #injection, and load remote python code, python packages and python C-extensions from #memory.

Features:-

1. Windows #payload can load the entire Python #interpreter from memory using a reflective #DLL.
2. Can be packed into a single .py file and run without any dependencies other than the python standard library on all OSes.
3. Reflectively migrate into other processes.
4. Easily extensible, modules are simple to write and are sorted by os and category.
5. Modules can directly access python objects on the remote client using rpyc.
6. Access remote objects interactively from the pupy shell and get auto-completion of remote attributes.
7. Communication transports are modular and stackable. Exfiltrate data using #HTTP over HTTP over #AES over #XOR, or any combination of the available transports.
8. Communicate using obfsproxy pluggable transports.
9. Execute non-interactive commands on multiple hosts at once.
10. Commands and scripts running on remote hosts are interruptible.
11. Auto-completion for #commands and arguments.
12. Custom config can be defined: command aliases, modules. automatically run at connection, etc.
13. Open interactive python shells with auto-completion on the all-in-memory remote python interpreter.
14. Interactive shells (cmd.exe, /bin/bash, etc) can be opened remotely.
15. Remotely import pure python packages (.py, .pyc) and compiled python C extensions (.pyd, .so) from memory.
16. Execute the PE executable remotely and from memory.
17. Generate payloads in various formats:

#Download #Link:--

https://github.com/n1nj4sec/pupy


Pupy:-- #Pupy is an #opensource, #cross-platform (#Windows, #Linux, #OSX, #Android) #remote #administration and #post-#exploitation tool mainly written in #python.

Pupy is a cross-platform, multi-function #RAT and post-exploitation tool mainly written in python. It features an all-in-memory execution guideline and leaves a very low footprint. Pupy can communicate using multiple modes of #transport, migrate into #processes using reflective #injection, and load remote python code, python packages and python C-extensions from #memory.

Features:-

1. Windows #payload can load the entire Python #interpreter from memory using a reflective #DLL.
2. Can be packed into a single .py file and run without any dependencies other than the python standard library on all OSes.
3. Reflectively migrate into other processes.
4. Easily extensible, modules are simple to write and are sorted by os and category.
5. Modules can directly access python objects on the remote client using rpyc.
6. Access remote objects interactively from the pupy shell and get auto-completion of remote attributes.
7. Communication transports are modular and stackable. Exfiltrate data using #HTTP over HTTP over #AES over #XOR, or any combination of the available transports.
8. Communicate using obfsproxy pluggable transports.
9. Execute non-interactive commands on multiple hosts at once.
10. Commands and scripts running on remote hosts are interruptible.
11. Auto-completion for #commands and arguments.
12. Custom config can be defined: command aliases, modules. automatically run at connection, etc.
13. Open interactive python shells with auto-completion on the all-in-memory remote python interpreter.
14. Interactive shells (cmd.exe, /bin/bash, etc) can be opened remotely.
15. Remotely import pure python packages (.py, .pyc) and compiled python C extensions (.pyd, .so) from memory.
16. Execute the PE executable remotely and from memory.
17. Generate payloads in various formats:
Trojan-Qt5:-- A #cross-platform #trojan #GUI #client, based on Shadowsocks-qt.

Requirement:-

1. #Windows, #macOS, #Linux
2. c++ compiler(cl, clang, #gcc)
3. Qt 5.13.0 +
4. QHttpServer(follow the instruction below to install)

#Download #Link:-

https://github.com/TheWanderingCoel/Trojan-Qt5


Trojan-Qt5:-- A #cross-platform #trojan #GUI #client, based on Shadowsocks-qt.

Requirement:-

1. #Windows, #macOS, #Linux
2. c++ compiler(cl, clang, #gcc)
3. Qt 5.13.0 +
4. QHttpServer(follow the instruction below to install)

#Download #Link:-

https://github.com/TheWanderingCoel/Trojan-Qt5
لمحبي نظام #لينكس #Linux
لقد شرحنا في هذا الدرس عن نظام ديبيان #Debian وقد شرحنا به عن التوزيعة و متطلبات تثبيتها و مميزاتها ..... الخ.
https://www.nusurtech.ca/2022/11/what-is-debian-linux-system.html

لطفاً إن أعجبك المقال إدعمنا بمشاركته ونشره 😇.

قناة تيلغرام t.me/NusurTech