The Hacking Library
350 subscribers
874 photos
19 videos
44 files
1.3K links
محتوي القناه هو عباره عن تجميع
القناه عباره عن ارشيف للهكرز الأخلاقيات وغير الأخلاقيين
استمتعوا😀👍
Download Telegram
Hacked Cam

http://176.228.0.39

user
user
Photos from National Cyber Security Services's post


DevAudit:-- Open-source, cross-platform, multi-purpose #security #auditing #tool targeted at #developers and #teams adopting #DevOps and #DevSecOps that detects security #vulnerabilities at multiple levels of the solution stack.

Features:-

1. Cross-platform with a #Docker image also available.
2. #CLI interface.
3. Continuously updated vulnerabilities data.
4. Audit #operating #system and #development package dependencies.
5. Audit application #server configurations.
6. Audit application #configurations.
7. Audit application #code by #static analysis.
8. #Remote agentless auditing.
9. Agentless Docker container auditing.
10. #GitHub repository auditing.
11. #PowerShell support.

#Download #Link:-

https://github.com/OSSIndex/DevAudit
Photos from National Cyber Security Services's post


AutoXploit:-- Fast #exploitation based on #metasploit.

Auto #Payload Generator & #Exploiter

#AutoXploit is simply a shell script that helps you to generate Metasploit payloads and starts the #meterpreter handler quickly. At times, #security #researchers have to generate payloads and listen to the connection through handler constantly, AutoXploit not only allows you to quickly generate payloads but it also has an option to start the handler automatically.

#Download #Link:-

https://github.com/Yashvendra/AutoXploit
البيانات المستهلكه في مشاهده دقيقه واحده من الفيديو
IDACyber- Data Visualization Plugin for IDA Pro


IDACyber:-- #Data #Visualization #Plugin for #IDA #Pro.

#IDACyber is an interactive data visualization plugin for IDA Pro. It consists of external "color filters" that transform raw data bytes into a canvas that can be used to inspect and navigate data interactively. Depending on the filter in context, browsing this data visually can reveal particular structures and patterns, literally from a zoomed-out perspective.

Requirements
1. IDA 7.3+
2. This #IDAPython project is compatible with #Python3 only. For compatibility with older versions of IDA, you may want to check out the Python2 branch of this project. The Python2 branch is no longer maintained and thus contains outdated code.

#Download #Link:-

https://github.com/patois/IDACyber





(Feed generated with FetchRSS (http://fetchrss.com/))
A game for computer geeks in which you use your SQL knowledge and SQL commands to figure out the murder mystery 💪
Taken from JRE w/Edward Snowden
The Hacking Library pinned «https://www.programmer-tech.ml/2019/12/ecstasy.html»
Forwarded from Caito Ceed
المتسابق رقم؛ 1
Caito Ceed
جوائز مضمونه ✓
@Unknowns0xF @Unknowns0xF
صوتو لي
Photos from National Cyber Security Services's post


Ropper:-- Display #information about files in different file formats and find gadgets to build #rop chains for different #architectures (x86/x86_64, #ARM/ #ARM64, #MIPS, #PowerPC, #SPARC64). For #disassembly, ropper uses the awesome Capstone #Framework.

$ git clone https://github.com/sashs/ropper.git
$ cd ropper
$ git submodule init
$ git submodule update
$ ./Ropper.py

#Download #Link:-

https://github.com/sashs/Ropper