GreenDos:-- It is developed convert #Dos Attack to #Ddos to test your #service on the #internet.
1) At first, you have to enter a specific domain as input.
2) It will ping the #Domain that you gave to get the IP.
3) By using #masscan it scans all the #ports in range 1 to 65535 to find the open ones.
4) For the last step, it will send packets from randomly generated source #IP and port to destination.
#Download #Link:-
https://github.com/greenmns/GreenDos
GreenDos:-- It is developed convert #Dos Attack to #Ddos to test your #service on the #internet.
1) At first, you have to enter a specific domain as input.
2) It will ping the #Domain that you gave to get the IP.
3) By using #masscan it scans all the #ports in range 1 to 65535 to find the open ones.
4) For the last step, it will send packets from randomly generated source #IP and port to destination.
#Download #Link:-
https://github.com/greenmns/GreenDos
1) At first, you have to enter a specific domain as input.
2) It will ping the #Domain that you gave to get the IP.
3) By using #masscan it scans all the #ports in range 1 to 65535 to find the open ones.
4) For the last step, it will send packets from randomly generated source #IP and port to destination.
#Download #Link:-
https://github.com/greenmns/GreenDos
GreenDos:-- It is developed convert #Dos Attack to #Ddos to test your #service on the #internet.
1) At first, you have to enter a specific domain as input.
2) It will ping the #Domain that you gave to get the IP.
3) By using #masscan it scans all the #ports in range 1 to 65535 to find the open ones.
4) For the last step, it will send packets from randomly generated source #IP and port to destination.
#Download #Link:-
https://github.com/greenmns/GreenDos
Eagle Eyes:-- Eagle Eyes is a #powerful low-level #TCP #networking #RAT. Supporting #desktop streaming, #webcam streaming, audio listening, #keylogging & more available from its CLI.
Eagle Eyes is a #spyware #Python program created for #Windows that supports multiple ways to collect #data & automatically save everything organized in folders. It has two shells you will use, the first #shell is to control & manage clients & options. It is also from this shell you have can connect to a client session. This will give a reverse shell-like connection to a specific client with extra built-in commands.
#Download #Link:-
https://github.com/Alvin-22/Eagle-Eyes
Eagle Eyes:-- Eagle Eyes is a #powerful low-level #TCP #networking #RAT. Supporting #desktop streaming, #webcam streaming, audio listening, #keylogging & more available from its CLI.
Eagle Eyes is a #spyware #Python program created for #Windows that supports multiple ways to collect #data & automatically save everything organized in folders. It has two shells you will use, the first #shell is to control & manage clients & options. It is also from this shell you have can connect to a client session. This will give a reverse shell-like connection to a specific client with extra built-in commands.
#Download #Link:-
https://github.com/Alvin-22/Eagle-Eyes
Eagle Eyes is a #spyware #Python program created for #Windows that supports multiple ways to collect #data & automatically save everything organized in folders. It has two shells you will use, the first #shell is to control & manage clients & options. It is also from this shell you have can connect to a client session. This will give a reverse shell-like connection to a specific client with extra built-in commands.
#Download #Link:-
https://github.com/Alvin-22/Eagle-Eyes
Eagle Eyes:-- Eagle Eyes is a #powerful low-level #TCP #networking #RAT. Supporting #desktop streaming, #webcam streaming, audio listening, #keylogging & more available from its CLI.
Eagle Eyes is a #spyware #Python program created for #Windows that supports multiple ways to collect #data & automatically save everything organized in folders. It has two shells you will use, the first #shell is to control & manage clients & options. It is also from this shell you have can connect to a client session. This will give a reverse shell-like connection to a specific client with extra built-in commands.
#Download #Link:-
https://github.com/Alvin-22/Eagle-Eyes
Photos from National Cyber Security Services's post
Memhunter:-- Live #Hunting Of #Code #Injection #Techniques.
Memhunter is an endpoint sensor tool that is specialized in detecing resident #malware, improving the threat hunter analysis process and remediation times. The tool detects and reports memory-resident malware living on endpoint processes. Memhunter detects known #malicious #memory injection techniques. The detection #process is performed through live analysis and without needing memory dumps. The tool was designed as a replacement for memory #forensic #volatility #plugins such as malfind and hollowfind. The idea of not requiring memory dumps helps on performing the memory-resident malware threat hunting at scale, without manual #analysis, and without the complex #infrastructure needed to move dumps to forensic environments.
#Download #Link:-
https://github.com/marcosd4h/memhunter
Memhunter:-- Live #Hunting Of #Code #Injection #Techniques.
Memhunter is an endpoint sensor tool that is specialized in detecing resident #malware, improving the threat hunter analysis process and remediation times. The tool detects and reports memory-resident malware living on endpoint processes. Memhunter detects known #malicious #memory injection techniques. The detection #process is performed through live analysis and without needing memory dumps. The tool was designed as a replacement for memory #forensic #volatility #plugins such as malfind and hollowfind. The idea of not requiring memory dumps helps on performing the memory-resident malware threat hunting at scale, without manual #analysis, and without the complex #infrastructure needed to move dumps to forensic environments.
#Download #Link:-
https://github.com/marcosd4h/memhunter
Forwarded from NusurTech 2 ©️
YouTube
استخراج البيانات الوصفية من الصور الملتقطة بالهاتف و معرفة نوع الجهاز و موقعه و عدة معلومات اخرى
#محمد_تركي_العلوش #Programmer_Tech
قناتنا التلغرام
https://t.me/Programmer_Tech
الموقع
https://www.programmer-tech.com
صفحة الفيسبوك
https://www.facebook.com/ProgrammerTech.net
قناة اليوتيوب 1:
https://www.youtube.com/ahmadkaissar
قناة اليوتيوب 2:
https…
قناتنا التلغرام
https://t.me/Programmer_Tech
الموقع
https://www.programmer-tech.com
صفحة الفيسبوك
https://www.facebook.com/ProgrammerTech.net
قناة اليوتيوب 1:
https://www.youtube.com/ahmadkaissar
قناة اليوتيوب 2:
https…
Photos from National Cyber Security Services's post
Maltrail:-- #Malicious #traffic #detection #system.
Maltrail is a #malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user-defined lists, where trail can be anything from #domain name (e.g. zvpprsensinaix.com for #Banjori malware), URL (e.g. hXXp://109.162.38.120/harsh02.exe for known malicious executable), IP address (e.g. 185.130.5.231 for known attacker) or #HTTP User-Agent header value (e.g. #sqlmap for automatic #SQL #injection and #database takeover tool). Also, it uses (optional) advanced heuristic #mechanisms that can help in the discovery of unknown threats (e.g. new #malware).
#Downlaod #Link:-
https://github.com/stamparm/maltrail
Maltrail:-- #Malicious #traffic #detection #system.
Maltrail is a #malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user-defined lists, where trail can be anything from #domain name (e.g. zvpprsensinaix.com for #Banjori malware), URL (e.g. hXXp://109.162.38.120/harsh02.exe for known malicious executable), IP address (e.g. 185.130.5.231 for known attacker) or #HTTP User-Agent header value (e.g. #sqlmap for automatic #SQL #injection and #database takeover tool). Also, it uses (optional) advanced heuristic #mechanisms that can help in the discovery of unknown threats (e.g. new #malware).
#Downlaod #Link:-
https://github.com/stamparm/maltrail
OSINT-Framework- #OSINT #framework focused on #gathering #information from free #tools or #resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.
The framework was originally created with an information #security point of view. Since then, the response from other fields and disciplines has been incredible.
#Download #Link:-
https://github.com/lockfale/OSINT-Framework
OSINT-Framework- #OSINT #framework focused on #gathering #information from free #tools or #resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.
The framework was originally created with an information #security point of view. Since then, the response from other fields and disciplines has been incredible.
#Download #Link:-
https://github.com/lockfale/OSINT-Framework
The framework was originally created with an information #security point of view. Since then, the response from other fields and disciplines has been incredible.
#Download #Link:-
https://github.com/lockfale/OSINT-Framework
OSINT-Framework- #OSINT #framework focused on #gathering #information from free #tools or #resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.
The framework was originally created with an information #security point of view. Since then, the response from other fields and disciplines has been incredible.
#Download #Link:-
https://github.com/lockfale/OSINT-Framework
secDevLabs:-- A #laboratory for learning #secure #web #development in a #practical manner.
By provisioning local #environments via docker-compose, you will learn how the most #critical web #application #security risks are #exploited and how these #vulnerable codes can be fixed to mitigate them.
After forking this repository, you will find multiple intended vulnerable apps based on real-life scenarios in various languages such as #Golang, #Python and #PHP. A good start would be installing the ones you are most familiar with. You can find instructions to do this on each of the apps.
#Download #Link:-
https://github.com/globocom/secDevLabs
secDevLabs:-- A #laboratory for learning #secure #web #development in a #practical manner.
By provisioning local #environments via docker-compose, you will learn how the most #critical web #application #security risks are #exploited and how these #vulnerable codes can be fixed to mitigate them.
After forking this repository, you will find multiple intended vulnerable apps based on real-life scenarios in various languages such as #Golang, #Python and #PHP. A good start would be installing the ones you are most familiar with. You can find instructions to do this on each of the apps.
#Download #Link:-
https://github.com/globocom/secDevLabs
By provisioning local #environments via docker-compose, you will learn how the most #critical web #application #security risks are #exploited and how these #vulnerable codes can be fixed to mitigate them.
After forking this repository, you will find multiple intended vulnerable apps based on real-life scenarios in various languages such as #Golang, #Python and #PHP. A good start would be installing the ones you are most familiar with. You can find instructions to do this on each of the apps.
#Download #Link:-
https://github.com/globocom/secDevLabs
secDevLabs:-- A #laboratory for learning #secure #web #development in a #practical manner.
By provisioning local #environments via docker-compose, you will learn how the most #critical web #application #security risks are #exploited and how these #vulnerable codes can be fixed to mitigate them.
After forking this repository, you will find multiple intended vulnerable apps based on real-life scenarios in various languages such as #Golang, #Python and #PHP. A good start would be installing the ones you are most familiar with. You can find instructions to do this on each of the apps.
#Download #Link:-
https://github.com/globocom/secDevLabs