Forwarded from Termux CS
Photos from National Cyber Security Services's post
ClobberTime:-- #ClobberTime is a 3graphical frontend that provides functionality for the manipulation of #MAC (Modified, Accessed, Created) #timestamps during Windows Red Team or #Pentesting #engagements, without modifying current #system time and without invoking the #traditional timestomp binary. It is also designed as an #educational tool to demonstrate the difference between userland timestamps (which can be easily manipulated) and timestamps recorded in the #filesystem MFT.
#Windows #RedTeam
#Downlaod #Link:-
https://github.com/vhoudoverdov/Windows-RedTeam/tree/master/ClobberTime
ClobberTime:-- #ClobberTime is a 3graphical frontend that provides functionality for the manipulation of #MAC (Modified, Accessed, Created) #timestamps during Windows Red Team or #Pentesting #engagements, without modifying current #system time and without invoking the #traditional timestomp binary. It is also designed as an #educational tool to demonstrate the difference between userland timestamps (which can be easily manipulated) and timestamps recorded in the #filesystem MFT.
#Windows #RedTeam
#Downlaod #Link:-
https://github.com/vhoudoverdov/Windows-RedTeam/tree/master/ClobberTime
Forwarded from Yemen Cyber Army
دليل قنواتنا
t.me/BLACK_HAT_FR
t.me/BLACK_HAT_FR
Telegram
دليل قنوات SPIDER TEAM
دليل قنوات SPIDER TEAM
@Spider_Team00
@Spider_Team00
Expo:-- An #opensource platform for making #universal #native apps with #React. Expo runs on #Android, #iOS, and the #web.
Expo is an open-source platform for making universal native apps that run on Android, iOS, and the web. It includes a universal runtime and libraries that let you build native apps by writing #React and #JavaScript. This repository is where the Expo client #software is #developed and includes the client apps, modules, apps, and more. The Expo #CLI repository contains the Expo #development #tools.
#Download #Link:-
https://github.com/expo/expo
Expo:-- An #opensource platform for making #universal #native apps with #React. Expo runs on #Android, #iOS, and the #web.
Expo is an open-source platform for making universal native apps that run on Android, iOS, and the web. It includes a universal runtime and libraries that let you build native apps by writing #React and #JavaScript. This repository is where the Expo client #software is #developed and includes the client apps, modules, apps, and more. The Expo #CLI repository contains the Expo #development #tools.
#Download #Link:-
https://github.com/expo/expo
Expo is an open-source platform for making universal native apps that run on Android, iOS, and the web. It includes a universal runtime and libraries that let you build native apps by writing #React and #JavaScript. This repository is where the Expo client #software is #developed and includes the client apps, modules, apps, and more. The Expo #CLI repository contains the Expo #development #tools.
#Download #Link:-
https://github.com/expo/expo
Expo:-- An #opensource platform for making #universal #native apps with #React. Expo runs on #Android, #iOS, and the #web.
Expo is an open-source platform for making universal native apps that run on Android, iOS, and the web. It includes a universal runtime and libraries that let you build native apps by writing #React and #JavaScript. This repository is where the Expo client #software is #developed and includes the client apps, modules, apps, and more. The Expo #CLI repository contains the Expo #development #tools.
#Download #Link:-
https://github.com/expo/expo
Forwarded from Yemen Cyber Army
Telegram
Anonymous TV
تغطية أخبارية مباشرة...
Forwarded from Yemen Cyber Army
Telegram
Anonymous TV
تغطية أخبارية مباشرة...
Photos from National Cyber Security Services's post
Morpheus:-- Automated #Ettercap TCP/ #IP (MITM-hijacking Tool).
#Morpheus it's a Man-In-The-Middle (#MITM) suite that allows users to manipulate
#TCP/ #UDP data using #Ettercap, urlsnarf, msgsnarf, and tcpkill as backend applications.
but this tool main objective it's not to provide an easy way to #exploit/ #sniff targets,
but rather a call of attempting to TCP/UDP manipulations technics (etter filters)
Version release: v2.2 - STABLE
Author: Pedro #ubuntu [ r00t-3xp10it ]
Codename: Oneiroi Phobetor (The mithologic dream Greek god)
#Distros Supported: #Linux Ubuntu, #Kali, #Debian, #BackBox, #ParrotOS
#Download #Link:-
https://github.com/r00t-3xp10it/morpheus
Morpheus:-- Automated #Ettercap TCP/ #IP (MITM-hijacking Tool).
#Morpheus it's a Man-In-The-Middle (#MITM) suite that allows users to manipulate
#TCP/ #UDP data using #Ettercap, urlsnarf, msgsnarf, and tcpkill as backend applications.
but this tool main objective it's not to provide an easy way to #exploit/ #sniff targets,
but rather a call of attempting to TCP/UDP manipulations technics (etter filters)
Version release: v2.2 - STABLE
Author: Pedro #ubuntu [ r00t-3xp10it ]
Codename: Oneiroi Phobetor (The mithologic dream Greek god)
#Distros Supported: #Linux Ubuntu, #Kali, #Debian, #BackBox, #ParrotOS
#Download #Link:-
https://github.com/r00t-3xp10it/morpheus
The Hacking Library pinned «Photos from National Cyber Security Services's post Morpheus:-- Automated #Ettercap TCP/ #IP (MITM-hijacking Tool). #Morpheus it's a Man-In-The-Middle (#MITM) suite that allows users to manipulate #TCP/ #UDP data using #Ettercap, urlsnarf, msgsnarf, and…»
Photos from National Cyber Security Services's post
Hyperion:-- Hyperion-Project #Automate #recognition Pentesting "passif".
The program #Hyperion is a program called "Automate", playing the role of #Swiss #Knife in the step of recognition, #pentesting.
This one, gathers several programs in 1 only, to facilitate the so-called "passive" Pentesting step. The objective is to facilitate the testing of networks, #machines, services, as well as the detection of potential security #flaws constituting the #audited network.
#Download #Link:-
https://github.com/F0rbidden-Equation/Hyperion
Hyperion:-- Hyperion-Project #Automate #recognition Pentesting "passif".
The program #Hyperion is a program called "Automate", playing the role of #Swiss #Knife in the step of recognition, #pentesting.
This one, gathers several programs in 1 only, to facilitate the so-called "passive" Pentesting step. The objective is to facilitate the testing of networks, #machines, services, as well as the detection of potential security #flaws constituting the #audited network.
#Download #Link:-
https://github.com/F0rbidden-Equation/Hyperion