The Hacking Library
350 subscribers
874 photos
19 videos
44 files
1.3K links
محتوي القناه هو عباره عن تجميع
القناه عباره عن ارشيف للهكرز الأخلاقيات وغير الأخلاقيين
استمتعوا😀👍
Download Telegram
(Feed generated with FetchRSS (http://fetchrss.com/))
InjuredAndroid:-- A #Vulnerable #Android #Application That Shows Simple Examples Of #Vulnerabilities In A #CTF Style.

Setup for a physical device:-
1. Download injuredandroid.apk from #Github
2. Enable #USB debugging on your Android test phone.
3. Connect your phone and your pc with a #USB cable.
4. Install via ADB. ADB install injuredandroid.apk. Note: You need to use the absolute path to the .apk file or be in the same directory.

Setup for an Android #Emulator using Android Studio:-
1. Download the #APK file.
2. Start the emulator from Android Studio (I recommend downloading an emulator with #Google #APIs so #root adb can be enabled).
3. Drag and drop the .apk file on the emulator and injuredandroid.apk will install.

#Download #Link:-

https://github.com/B3nac/InjuredAndroid


InjuredAndroid:-- A #Vulnerable #Android #Application That Shows Simple Examples Of #Vulnerabilities In A #CTF Style.

Setup for a physical device:-
1. Download injuredandroid.apk from #Github
2. Enable #USB debugging on your Android test phone.
3. Connect your phone and your pc with a #USB cable.
4. Install via ADB. ADB install injuredandroid.apk. Note: You need to use the absolute path to the .apk file or be in the same directory.

Setup for an Android #Emulator using Android Studio:-
1. Download the #APK file.
2. Start the emulator from Android Studio (I recommend downloading an emulator with #Google #APIs so #root adb can be enabled).
3. Drag and drop the .apk file on the emulator and injuredandroid.apk will install.

#Download #Link:-

https://github.com/B3nac/InjuredAndroid
(Feed generated with FetchRSS (http://fetchrss.com/))
Photos from National Cyber Security Services's post


Ghost Framework:-- #Android #post #exploitation #framework that uses an Android Debug Bridge to #remotely access an Android device. #Ghost Framework gives you the power and convenience of #remote Android #device #administration.

Why ghost framework?
1. Accessing device shell
INFO: Ghost Framework can be used to access the remote
Android device #shell without using #OpenSSH or other protocols.

2. Emulating device button presses
INFO: Ghost Framework can be used to emulate
button presses on the remote Android device.

3. Removing device password
INFO: Ghost Framework can be used to remove the
remote Android device #password if it was forgotten.

#Downlaod #Link:-

https://github.com/entynetproject/ghost
(Feed generated with FetchRSS (http://fetchrss.com/))
#VirusTotal is very excited to announce a #beta release of a new #plugin for #IDA Pro v7 which integrates VT Intelligence’s content search directly into IDA.

This plugin adds a new "VirusTotal" entry to the IDA Pro context menu (#disassembly and strings #windows), enabling you to search for similar or exact #data on VirusTotal. It translates the user selection into a query that #VTGrep understands.

#Link:-

https://blog.virustotal.com/2020/02/official-virustotal-plugin-for-ida-pro-7.html?m=1


#VirusTotal is very excited to announce a #beta release of a new #plugin for #IDA Pro v7 which integrates VT Intelligence’s content search directly into IDA.

This plugin adds a new "VirusTotal" entry to the IDA Pro context menu (#disassembly and strings #windows), enabling you to search for similar or exact #data on VirusTotal. It translates the user selection into a query that #VTGrep understands.

#Link:-

https://blog.virustotal.com/2020/02/official-virustotal-plugin-for-ida-pro-7.html?m=1
(Feed generated with FetchRSS (http://fetchrss.com/))
#Django-DefectDojo:--

#DefectDojo is an #open-source #application #vulnerability correlation and #security #orchestration #tool.

DefectDojo is a security program and vulnerability #management tool. DefectDojo allows you to manage your application #security #program, maintain product and application #information, schedule #scans, triage #vulnerabilities and push findings into #defect trackers. Consolidate your findings into one source of truth with #DefectDojo.

#Download #Link:-

https://github.com/DefectDojo/django-DefectDojo


#Django-DefectDojo:--

#DefectDojo is an #open-source #application #vulnerability correlation and #security #orchestration #tool.

DefectDojo is a security program and vulnerability #management tool. DefectDojo allows you to manage your application #security #program, maintain product and application #information, schedule #scans, triage #vulnerabilities and push findings into #defect trackers. Consolidate your findings into one source of truth with #DefectDojo.

#Download #Link:-

https://github.com/DefectDojo/django-DefectDojo
(Feed generated with FetchRSS (http://fetchrss.com/))
#mr-lunix
from requests import get

yourip = get('https://api.ipify.org').text
print('Your public IP address is: {}'.format(yourip))



اسكربت بايثون بسيط لمعرفه الايبي الخارجي الخاص بك
يمكنك استخدامه للتاكد من ان الايبي الخاص بك قد تغير حتي لا تقع في المشاكل
Photos from National Cyber Security Services's post


BlackWidow:-- A #Python-based #web #application #scanner to gather #OSINT and fuzz for #OWASP #vulnerabilities on a target website.

#BlackWidow is a python based web application spider to gather #subdomains, #URL's, #dynamic #parameters, #email addresses and #phone numbers from a #target #website. This project also includes Inject-X fuzzer to scan dynamic URL's for common OWASP vulnerabilities.

#FEATURES:-
1. Automatically collect all URL's from a target website
2. Automatically collect all dynamic URL's and parameters from a target website
3. Automatically collect all subdomains from a target website
4. Automatically collect all phone numbers from a target website
5. Automatically collect all email addresses from a target website
6. Automatically collect all form URL's from a target website
7. Automatically scan/fuzz for common OWASP TOP vulnerabilities
8. Automatically saves all data into sorted text files

#Download #Link:-

https://github.com/1N3/BlackWidow
(Feed generated with FetchRSS (http://fetchrss.com/))
Photos from National Cyber Security Services's post


DroneSploit:-- #Drone #Pentesting #Framework console.

This #CLI framework is based on #sploitkit and is an attempt to gather hacking techniques and #exploits especially focused on drone #hacking. For ease of use, the interface has a layout that looks like #Metasploit.

#Download #Link:-

https://github.com/dhondta/dronesploit