The Hacking Library
350 subscribers
874 photos
19 videos
44 files
1.3K links
محتوي القناه هو عباره عن تجميع
القناه عباره عن ارشيف للهكرز الأخلاقيات وغير الأخلاقيين
استمتعوا😀👍
Download Telegram
GreenDos:-- It is developed convert #Dos Attack to #Ddos to test your #service on the #internet.

1) At first, you have to enter a specific domain as input.
2) It will ping the #Domain that you gave to get the IP.
3) By using #masscan it scans all the #ports in range 1 to 65535 to find the open ones.
4) For the last step, it will send packets from randomly generated source #IP and port to destination.

#Download #Link:-

https://github.com/greenmns/GreenDos


GreenDos:-- It is developed convert #Dos Attack to #Ddos to test your #service on the #internet.

1) At first, you have to enter a specific domain as input.
2) It will ping the #Domain that you gave to get the IP.
3) By using #masscan it scans all the #ports in range 1 to 65535 to find the open ones.
4) For the last step, it will send packets from randomly generated source #IP and port to destination.

#Download #Link:-

https://github.com/greenmns/GreenDos
(Feed generated with FetchRSS (http://fetchrss.com/))
Eagle Eyes:-- Eagle Eyes is a #powerful low-level #TCP #networking #RAT. Supporting #desktop streaming, #webcam streaming, audio listening, #keylogging & more available from its CLI.

Eagle Eyes is a #spyware #Python program created for #Windows that supports multiple ways to collect #data & automatically save everything organized in folders. It has two shells you will use, the first #shell is to control & manage clients & options. It is also from this shell you have can connect to a client session. This will give a reverse shell-like connection to a specific client with extra built-in commands.

#Download #Link:-

https://github.com/Alvin-22/Eagle-Eyes


Eagle Eyes:-- Eagle Eyes is a #powerful low-level #TCP #networking #RAT. Supporting #desktop streaming, #webcam streaming, audio listening, #keylogging & more available from its CLI.

Eagle Eyes is a #spyware #Python program created for #Windows that supports multiple ways to collect #data & automatically save everything organized in folders. It has two shells you will use, the first #shell is to control & manage clients & options. It is also from this shell you have can connect to a client session. This will give a reverse shell-like connection to a specific client with extra built-in commands.

#Download #Link:-

https://github.com/Alvin-22/Eagle-Eyes
(Feed generated with FetchRSS (http://fetchrss.com/))
Photos from National Cyber Security Services's post


Memhunter:-- Live #Hunting Of #Code #Injection #Techniques.

Memhunter is an endpoint sensor tool that is specialized in detecing resident #malware, improving the threat hunter analysis process and remediation times. The tool detects and reports memory-resident malware living on endpoint processes. Memhunter detects known #malicious #memory injection techniques. The detection #process is performed through live analysis and without needing memory dumps. The tool was designed as a replacement for memory #forensic #volatility #plugins such as malfind and hollowfind. The idea of not requiring memory dumps helps on performing the memory-resident malware threat hunting at scale, without manual #analysis, and without the complex #infrastructure needed to move dumps to forensic environments.

#Download #Link:-

https://github.com/marcosd4h/memhunter
(Feed generated with FetchRSS (http://fetchrss.com/))
Forwarded from NusurTech 2 ©️
ستبدأ قناة احمد قيصر في بايثون من البداية الي الاحتراف

https://youtu.be/VfzEriil3Go
Photos from National Cyber Security Services's post


Maltrail:-- #Malicious #traffic #detection #system.

Maltrail is a #malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user-defined lists, where trail can be anything from #domain name (e.g. zvpprsensinaix.com for #Banjori malware), URL (e.g. hXXp://109.162.38.120/harsh02.exe for known malicious executable), IP address (e.g. 185.130.5.231 for known attacker) or #HTTP User-Agent header value (e.g. #sqlmap for automatic #SQL #injection and #database takeover tool). Also, it uses (optional) advanced heuristic #mechanisms that can help in the discovery of unknown threats (e.g. new #malware).

#Downlaod #Link:-

https://github.com/stamparm/maltrail
(Feed generated with FetchRSS (http://fetchrss.com/))
OSINT-Framework- #OSINT #framework focused on #gathering #information from free #tools or #resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.

The framework was originally created with an information #security point of view. Since then, the response from other fields and disciplines has been incredible.

#Download #Link:-

https://github.com/lockfale/OSINT-Framework


OSINT-Framework- #OSINT #framework focused on #gathering #information from free #tools or #resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.

The framework was originally created with an information #security point of view. Since then, the response from other fields and disciplines has been incredible.

#Download #Link:-

https://github.com/lockfale/OSINT-Framework
(Feed generated with FetchRSS (http://fetchrss.com/))
secDevLabs:-- A #laboratory for learning #secure #web #development in a #practical manner.

By provisioning local #environments via docker-compose, you will learn how the most #critical web #application #security risks are #exploited and how these #vulnerable codes can be fixed to mitigate them.

After forking this repository, you will find multiple intended vulnerable apps based on real-life scenarios in various languages such as #Golang, #Python and #PHP. A good start would be installing the ones you are most familiar with. You can find instructions to do this on each of the apps.

#Download #Link:-

https://github.com/globocom/secDevLabs


secDevLabs:-- A #laboratory for learning #secure #web #development in a #practical manner.

By provisioning local #environments via docker-compose, you will learn how the most #critical web #application #security risks are #exploited and how these #vulnerable codes can be fixed to mitigate them.

After forking this repository, you will find multiple intended vulnerable apps based on real-life scenarios in various languages such as #Golang, #Python and #PHP. A good start would be installing the ones you are most familiar with. You can find instructions to do this on each of the apps.

#Download #Link:-

https://github.com/globocom/secDevLabs
(Feed generated with FetchRSS (http://fetchrss.com/))