The Hacking Library
350 subscribers
874 photos
19 videos
44 files
1.3K links
محتوي القناه هو عباره عن تجميع
القناه عباره عن ارشيف للهكرز الأخلاقيات وغير الأخلاقيين
استمتعوا😀👍
Download Telegram
البيانات المستهلكه في مشاهده دقيقه واحده من الفيديو
IDACyber- Data Visualization Plugin for IDA Pro


IDACyber:-- #Data #Visualization #Plugin for #IDA #Pro.

#IDACyber is an interactive data visualization plugin for IDA Pro. It consists of external "color filters" that transform raw data bytes into a canvas that can be used to inspect and navigate data interactively. Depending on the filter in context, browsing this data visually can reveal particular structures and patterns, literally from a zoomed-out perspective.

Requirements
1. IDA 7.3+
2. This #IDAPython project is compatible with #Python3 only. For compatibility with older versions of IDA, you may want to check out the Python2 branch of this project. The Python2 branch is no longer maintained and thus contains outdated code.

#Download #Link:-

https://github.com/patois/IDACyber





(Feed generated with FetchRSS (http://fetchrss.com/))
A game for computer geeks in which you use your SQL knowledge and SQL commands to figure out the murder mystery 💪
Taken from JRE w/Edward Snowden
The Hacking Library pinned «https://www.programmer-tech.ml/2019/12/ecstasy.html»
Forwarded from Caito Ceed
المتسابق رقم؛ 1
Caito Ceed
جوائز مضمونه ✓
@Unknowns0xF @Unknowns0xF
صوتو لي
Photos from National Cyber Security Services's post


Ropper:-- Display #information about files in different file formats and find gadgets to build #rop chains for different #architectures (x86/x86_64, #ARM/ #ARM64, #MIPS, #PowerPC, #SPARC64). For #disassembly, ropper uses the awesome Capstone #Framework.

$ git clone https://github.com/sashs/ropper.git
$ cd ropper
$ git submodule init
$ git submodule update
$ ./Ropper.py

#Download #Link:-

https://github.com/sashs/Ropper
Forwarded from NusurTech 2 ©️
السلام عليكم مقالة جيدة في استخدام بايثون في عالم التشفير كما هناك ايضا
كيفية انشاء سكربت تشفير بستخدام مكتبة
Base64;;;;; hashlib
رابط المقال

https://www.updatelap.com/2019/12/encoding-hash.html?m=1
CrackMapExtreme:-- For all your #network #pentesting needs.

This started off as a #python3 update to #CrackMapExec.
As I was converting, several issues came up due to dependencies that I ended up changing a bit of how things work.

Not all #modules have been carried over yet and this is still a work in progress.
Feel free to open issues, I know of a few (usually due to target #OS compatibility)
but will still use the issue log to track/address.

The same cme feels, just a bit different under-the-hood.

#Doownload #Link:-

https://github.com/awsmhacks/CrackMapExtreme


CrackMapExtreme:-- For all your #network #pentesting needs.

This started off as a #python3 update to #CrackMapExec.
As I was converting, several issues came up due to dependencies that I ended up changing a bit of how things work.

Not all #modules have been carried over yet and this is still a work in progress.
Feel free to open issues, I know of a few (usually due to target #OS compatibility)
but will still use the issue log to track/address.

The same cme feels, just a bit different under-the-hood.

#Doownload #Link:-

https://github.com/awsmhacks/CrackMapExtreme
Exutils:-- #Command line #extension #utilities.

A collection of #commands to make the troublesome one-liner a little easier.

About the concept:-
1. Commands that were not likely.
2. A command is written in a #Bash script.
3. Specializing in command-line operation.
4. Complex processing can be expressed with just a few characters.

#Downlaod #Link:-

https://github.com/redpeacock78/exutils


Exutils:-- #Command line #extension #utilities.

A collection of #commands to make the troublesome one-liner a little easier.

About the concept:-
1. Commands that were not likely.
2. A command is written in a #Bash script.
3. Specializing in command-line operation.
4. Complex processing can be expressed with just a few characters.

#Downlaod #Link:-

https://github.com/redpeacock78/exutils