Photos from National Cyber Security Services's post
Ropper:-- Display #information about files in different file formats and find gadgets to build #rop chains for different #architectures (x86/x86_64, #ARM/ #ARM64, #MIPS, #PowerPC, #SPARC64). For #disassembly, ropper uses the awesome Capstone #Framework.
$ git clone https://github.com/sashs/ropper.git
$ cd ropper
$ git submodule init
$ git submodule update
$ ./Ropper.py
#Download #Link:-
https://github.com/sashs/Ropper
Ropper:-- Display #information about files in different file formats and find gadgets to build #rop chains for different #architectures (x86/x86_64, #ARM/ #ARM64, #MIPS, #PowerPC, #SPARC64). For #disassembly, ropper uses the awesome Capstone #Framework.
$ git clone https://github.com/sashs/ropper.git
$ cd ropper
$ git submodule init
$ git submodule update
$ ./Ropper.py
#Download #Link:-
https://github.com/sashs/Ropper
Forwarded from NusurTech 2 ©️
السلام عليكم مقالة جيدة في استخدام بايثون في عالم التشفير كما هناك ايضا
كيفية انشاء سكربت تشفير بستخدام مكتبة
Base64;;;;; hashlib
رابط المقال
https://www.updatelap.com/2019/12/encoding-hash.html?m=1
كيفية انشاء سكربت تشفير بستخدام مكتبة
Base64;;;;; hashlib
رابط المقال
https://www.updatelap.com/2019/12/encoding-hash.html?m=1
Update - أب ديت
شرح الـ encoding والـ Hash وكيفية انشاء سكربت لتشفير
نهدف لزيادة المخزون العربي في شتى مجالات امن المعلومات والحمايه والاختراق
CrackMapExtreme:-- For all your #network #pentesting needs.
This started off as a #python3 update to #CrackMapExec.
As I was converting, several issues came up due to dependencies that I ended up changing a bit of how things work.
Not all #modules have been carried over yet and this is still a work in progress.
Feel free to open issues, I know of a few (usually due to target #OS compatibility)
but will still use the issue log to track/address.
The same cme feels, just a bit different under-the-hood.
#Doownload #Link:-
https://github.com/awsmhacks/CrackMapExtreme
CrackMapExtreme:-- For all your #network #pentesting needs.
This started off as a #python3 update to #CrackMapExec.
As I was converting, several issues came up due to dependencies that I ended up changing a bit of how things work.
Not all #modules have been carried over yet and this is still a work in progress.
Feel free to open issues, I know of a few (usually due to target #OS compatibility)
but will still use the issue log to track/address.
The same cme feels, just a bit different under-the-hood.
#Doownload #Link:-
https://github.com/awsmhacks/CrackMapExtreme
This started off as a #python3 update to #CrackMapExec.
As I was converting, several issues came up due to dependencies that I ended up changing a bit of how things work.
Not all #modules have been carried over yet and this is still a work in progress.
Feel free to open issues, I know of a few (usually due to target #OS compatibility)
but will still use the issue log to track/address.
The same cme feels, just a bit different under-the-hood.
#Doownload #Link:-
https://github.com/awsmhacks/CrackMapExtreme
CrackMapExtreme:-- For all your #network #pentesting needs.
This started off as a #python3 update to #CrackMapExec.
As I was converting, several issues came up due to dependencies that I ended up changing a bit of how things work.
Not all #modules have been carried over yet and this is still a work in progress.
Feel free to open issues, I know of a few (usually due to target #OS compatibility)
but will still use the issue log to track/address.
The same cme feels, just a bit different under-the-hood.
#Doownload #Link:-
https://github.com/awsmhacks/CrackMapExtreme
Exutils:-- #Command line #extension #utilities.
A collection of #commands to make the troublesome one-liner a little easier.
About the concept:-
1. Commands that were not likely.
2. A command is written in a #Bash script.
3. Specializing in command-line operation.
4. Complex processing can be expressed with just a few characters.
#Downlaod #Link:-
https://github.com/redpeacock78/exutils
Exutils:-- #Command line #extension #utilities.
A collection of #commands to make the troublesome one-liner a little easier.
About the concept:-
1. Commands that were not likely.
2. A command is written in a #Bash script.
3. Specializing in command-line operation.
4. Complex processing can be expressed with just a few characters.
#Downlaod #Link:-
https://github.com/redpeacock78/exutils
A collection of #commands to make the troublesome one-liner a little easier.
About the concept:-
1. Commands that were not likely.
2. A command is written in a #Bash script.
3. Specializing in command-line operation.
4. Complex processing can be expressed with just a few characters.
#Downlaod #Link:-
https://github.com/redpeacock78/exutils
Exutils:-- #Command line #extension #utilities.
A collection of #commands to make the troublesome one-liner a little easier.
About the concept:-
1. Commands that were not likely.
2. A command is written in a #Bash script.
3. Specializing in command-line operation.
4. Complex processing can be expressed with just a few characters.
#Downlaod #Link:-
https://github.com/redpeacock78/exutils
Forwarded from NusurTech 2 ©️
Forwarded from NusurTech 2 ©️
بث مباشر للمبرمج المصري احمد قيصر على يوتيوب حالياً للأستفسار عن اي شي بمجال الهاكينغ او البرمجة
والتعريف ببعض مكتبات البايثون وكيفيه استخدامها و يناء سكربت تشفير وفك تشفير بعده طرق مثل base64.sha......الخ
رابط البث اهلا وسهلا بالجميع
https://www.youtube.com/c/AhmadKaissar/live
والتعريف ببعض مكتبات البايثون وكيفيه استخدامها و يناء سكربت تشفير وفك تشفير بعده طرق مثل base64.sha......الخ
رابط البث اهلا وسهلا بالجميع
https://www.youtube.com/c/AhmadKaissar/live
Forwarded from NusurTech 2 ©️
بث مباشر للمبرمج المصري احمد قيصر على يوتيوب حالياً للأستفسار عن اي شي بمجال الهاكينغ او البرمجة
والتعريف ببعض مكتبات البايثون وكيفيه استخدامها و يناء سكربت تشفير وفك تشفير بعده طرق مثل base64.sha......الخ
رابط البث اهلا وسهلا بالجميع
https://www.youtube.com/c/AhmadKaissar/live
والتعريف ببعض مكتبات البايثون وكيفيه استخدامها و يناء سكربت تشفير وفك تشفير بعده طرق مثل base64.sha......الخ
رابط البث اهلا وسهلا بالجميع
https://www.youtube.com/c/AhmadKaissar/live
Sandpolis:-- #Ultimate #Remote #Management #utility.
#Sandpolis is a remote administration platform for #servers, #desktop #computers, and anything in-between.
Sandpolis is designed for #sysadmins and #enthusiasts but can be used by anyone once set up. Most users will use Sandpolis via the #JavaFX desktop application or the #iOS #mobile #application.
⚡️Sandpolis is unfinished and therefore should only be used in a #secure #testing environment! ⚡️
Here are some fundamental objectives that Sandpolis tries to achieve:-
1. compatible with as many operating systems as possible
2. #flexible, configurable, and easily extensible to niche applications via #plugins
3. uncompromising on #performance and #security
4. low latency and high concurrency
5. user-friendly
#Download #Link:-
https://github.com/Subterranean-Security/Sandpolis
Sandpolis:-- #Ultimate #Remote #Management #utility.
#Sandpolis is a remote administration platform for #servers, #desktop #computers, and anything in-between.
Sandpolis is designed for #sysadmins and #enthusiasts but can be used by anyone once set up. Most users will use Sandpolis via the #JavaFX desktop application or the #iOS #mobile #application.
⚡️Sandpolis is unfinished and therefore should only be used in a #secure #testing environment! ⚡️
Here are some fundamental objectives that Sandpolis tries to achieve:-
1. compatible with as many operating systems as possible
2. #flexible, configurable, and easily extensible to niche applications via #plugins
3. uncompromising on #performance and #security
4. low latency and high concurrency
5. user-friendly
#Download #Link:-
https://github.com/Subterranean-Security/Sandpolis
#Sandpolis is a remote administration platform for #servers, #desktop #computers, and anything in-between.
Sandpolis is designed for #sysadmins and #enthusiasts but can be used by anyone once set up. Most users will use Sandpolis via the #JavaFX desktop application or the #iOS #mobile #application.
⚡️Sandpolis is unfinished and therefore should only be used in a #secure #testing environment! ⚡️
Here are some fundamental objectives that Sandpolis tries to achieve:-
1. compatible with as many operating systems as possible
2. #flexible, configurable, and easily extensible to niche applications via #plugins
3. uncompromising on #performance and #security
4. low latency and high concurrency
5. user-friendly
#Download #Link:-
https://github.com/Subterranean-Security/Sandpolis
Sandpolis:-- #Ultimate #Remote #Management #utility.
#Sandpolis is a remote administration platform for #servers, #desktop #computers, and anything in-between.
Sandpolis is designed for #sysadmins and #enthusiasts but can be used by anyone once set up. Most users will use Sandpolis via the #JavaFX desktop application or the #iOS #mobile #application.
⚡️Sandpolis is unfinished and therefore should only be used in a #secure #testing environment! ⚡️
Here are some fundamental objectives that Sandpolis tries to achieve:-
1. compatible with as many operating systems as possible
2. #flexible, configurable, and easily extensible to niche applications via #plugins
3. uncompromising on #performance and #security
4. low latency and high concurrency
5. user-friendly
#Download #Link:-
https://github.com/Subterranean-Security/Sandpolis
AttackSurfaceMapper:-- #AttackSurfaceMapper is a #tool that aims to #automate the #reconnaissance #process.
Attack Surface Mapper is a reconnaissance tool that uses a mixture of #opensource #intelligence and #active techniques to expand the attack surface of your target. You feed in a mixture of one or more domains, #subdomains, and IP addresses and it uses numerous techniques to find more targets. It #enumerates subdomains with #bruteforcing and passive lookups, Other IPs of the same network block owner, IPs that have multiple domain names pointing to them and so on.
Once the target list is fully expanded it performs passive reconnaissance on them, taking screenshots of #websites, generating visual #maps, looking up credentials in public breaches, passive port scanning with #Shodan and scraping #employees from #LinkedIn.
Add optional API keys to enable more data gathering
Register and obtain an API key from:-
1. #VirusTotal
2. #ShodanIO
3. #HunterIO
4. #WeLeakInfo
5. LinkedIn
6. #GrayHatWarfare
#Download #Link:-
https://github.com/superhedgy/AttackSurfaceMapper
AttackSurfaceMapper:-- #AttackSurfaceMapper is a #tool that aims to #automate the #reconnaissance #process.
Attack Surface Mapper is a reconnaissance tool that uses a mixture of #opensource #intelligence and #active techniques to expand the attack surface of your target. You feed in a mixture of one or more domains, #subdomains, and IP addresses and it uses numerous techniques to find more targets. It #enumerates subdomains with #bruteforcing and passive lookups, Other IPs of the same network block owner, IPs that have multiple domain names pointing to them and so on.
Once the target list is fully expanded it performs passive reconnaissance on them, taking screenshots of #websites, generating visual #maps, looking up credentials in public breaches, passive port scanning with #Shodan and scraping #employees from #LinkedIn.
Add optional API keys to enable more data gathering
Register and obtain an API key from:-
1. #VirusTotal
2. #ShodanIO
3. #HunterIO
4. #WeLeakInfo
5. LinkedIn
6. #GrayHatWarfare
#Download #Link:-
https://github.com/superhedgy/AttackSurfaceMapper
Attack Surface Mapper is a reconnaissance tool that uses a mixture of #opensource #intelligence and #active techniques to expand the attack surface of your target. You feed in a mixture of one or more domains, #subdomains, and IP addresses and it uses numerous techniques to find more targets. It #enumerates subdomains with #bruteforcing and passive lookups, Other IPs of the same network block owner, IPs that have multiple domain names pointing to them and so on.
Once the target list is fully expanded it performs passive reconnaissance on them, taking screenshots of #websites, generating visual #maps, looking up credentials in public breaches, passive port scanning with #Shodan and scraping #employees from #LinkedIn.
Add optional API keys to enable more data gathering
Register and obtain an API key from:-
1. #VirusTotal
2. #ShodanIO
3. #HunterIO
4. #WeLeakInfo
5. LinkedIn
6. #GrayHatWarfare
#Download #Link:-
https://github.com/superhedgy/AttackSurfaceMapper
AttackSurfaceMapper:-- #AttackSurfaceMapper is a #tool that aims to #automate the #reconnaissance #process.
Attack Surface Mapper is a reconnaissance tool that uses a mixture of #opensource #intelligence and #active techniques to expand the attack surface of your target. You feed in a mixture of one or more domains, #subdomains, and IP addresses and it uses numerous techniques to find more targets. It #enumerates subdomains with #bruteforcing and passive lookups, Other IPs of the same network block owner, IPs that have multiple domain names pointing to them and so on.
Once the target list is fully expanded it performs passive reconnaissance on them, taking screenshots of #websites, generating visual #maps, looking up credentials in public breaches, passive port scanning with #Shodan and scraping #employees from #LinkedIn.
Add optional API keys to enable more data gathering
Register and obtain an API key from:-
1. #VirusTotal
2. #ShodanIO
3. #HunterIO
4. #WeLeakInfo
5. LinkedIn
6. #GrayHatWarfare
#Download #Link:-
https://github.com/superhedgy/AttackSurfaceMapper
Forwarded from Yemen Cyber Army
عُدنا بعد الحذف
القناة الرسمية والوحيدة على تلجرام
#لبلاك_هات_الإسلامية
https://t.me/BLACK_HAT_ISLAMIIC
#BLACK_HAT
القناة الرسمية والوحيدة على تلجرام
#لبلاك_هات_الإسلامية
https://t.me/BLACK_HAT_ISLAMIIC
#BLACK_HAT
Telegram
BLACK HAT ISLAMIC
@BLACK_HAT_ISLAMIIC