The Hacking Library
351 subscribers
874 photos
19 videos
44 files
1.3K links
محتوي القناه هو عباره عن تجميع
القناه عباره عن ارشيف للهكرز الأخلاقيات وغير الأخلاقيين
استمتعوا😀👍
Download Telegram
CrackMapExtreme:-- For all your #network #pentesting needs.

This started off as a #python3 update to #CrackMapExec.
As I was converting, several issues came up due to dependencies that I ended up changing a bit of how things work.

Not all #modules have been carried over yet and this is still a work in progress.
Feel free to open issues, I know of a few (usually due to target #OS compatibility)
but will still use the issue log to track/address.

The same cme feels, just a bit different under-the-hood.

#Doownload #Link:-

https://github.com/awsmhacks/CrackMapExtreme


CrackMapExtreme:-- For all your #network #pentesting needs.

This started off as a #python3 update to #CrackMapExec.
As I was converting, several issues came up due to dependencies that I ended up changing a bit of how things work.

Not all #modules have been carried over yet and this is still a work in progress.
Feel free to open issues, I know of a few (usually due to target #OS compatibility)
but will still use the issue log to track/address.

The same cme feels, just a bit different under-the-hood.

#Doownload #Link:-

https://github.com/awsmhacks/CrackMapExtreme
Photos from National Cyber Security Services's post


ClobberTime:-- #ClobberTime is a 3graphical frontend that provides functionality for the manipulation of #MAC (Modified, Accessed, Created) #timestamps during Windows Red Team or #Pentesting #engagements, without modifying current #system time and without invoking the #traditional timestomp binary. It is also designed as an #educational tool to demonstrate the difference between userland timestamps (which can be easily manipulated) and timestamps recorded in the #filesystem MFT.

#Windows #RedTeam

#Downlaod #Link:-

https://github.com/vhoudoverdov/Windows-RedTeam/tree/master/ClobberTime
Photos from National Cyber Security Services's post


Hyperion:-- Hyperion-Project #Automate #recognition Pentesting "passif".

The program #Hyperion is a program called "Automate", playing the role of #Swiss #Knife in the step of recognition, #pentesting.

This one, gathers several programs in 1 only, to facilitate the so-called "passive" Pentesting step. The objective is to facilitate the testing of networks, #machines, services, as well as the detection of potential security #flaws constituting the #audited network.

#Download #Link:-

https://github.com/F0rbidden-Equation/Hyperion
Photos from National Cyber Security Services's post


PwnDoc:-- #Pentesting #report generator.

#PwnDoc is a #pentest reporting #application making it simple and easy to write your findings and generate a customizable docx report. The main goal is to have more time to Pwn and less time to Doc by mutualizing data like #vulnerabilities between users.

#Download #Link:-

https://github.com/pwndoc/pwndoc
Photos from National Cyber Security Services's post


DroneSploit:-- #Drone #Pentesting #Framework console.

This #CLI framework is based on #sploitkit and is an attempt to gather hacking techniques and #exploits especially focused on drone #hacking. For ease of use, the interface has a layout that looks like #Metasploit.

#Download #Link:-

https://github.com/dhondta/dronesploit