Forwarded from NusurTech 2 ©️
Forwarded from NusurTech 2 ©️
بث مباشر للمبرمج المصري احمد قيصر على يوتيوب حالياً للأستفسار عن اي شي بمجال الهاكينغ او البرمجة
والتعريف ببعض مكتبات البايثون وكيفيه استخدامها و يناء سكربت تشفير وفك تشفير بعده طرق مثل base64.sha......الخ
رابط البث اهلا وسهلا بالجميع
https://www.youtube.com/c/AhmadKaissar/live
والتعريف ببعض مكتبات البايثون وكيفيه استخدامها و يناء سكربت تشفير وفك تشفير بعده طرق مثل base64.sha......الخ
رابط البث اهلا وسهلا بالجميع
https://www.youtube.com/c/AhmadKaissar/live
Forwarded from NusurTech 2 ©️
بث مباشر للمبرمج المصري احمد قيصر على يوتيوب حالياً للأستفسار عن اي شي بمجال الهاكينغ او البرمجة
والتعريف ببعض مكتبات البايثون وكيفيه استخدامها و يناء سكربت تشفير وفك تشفير بعده طرق مثل base64.sha......الخ
رابط البث اهلا وسهلا بالجميع
https://www.youtube.com/c/AhmadKaissar/live
والتعريف ببعض مكتبات البايثون وكيفيه استخدامها و يناء سكربت تشفير وفك تشفير بعده طرق مثل base64.sha......الخ
رابط البث اهلا وسهلا بالجميع
https://www.youtube.com/c/AhmadKaissar/live
Sandpolis:-- #Ultimate #Remote #Management #utility.
#Sandpolis is a remote administration platform for #servers, #desktop #computers, and anything in-between.
Sandpolis is designed for #sysadmins and #enthusiasts but can be used by anyone once set up. Most users will use Sandpolis via the #JavaFX desktop application or the #iOS #mobile #application.
⚡️Sandpolis is unfinished and therefore should only be used in a #secure #testing environment! ⚡️
Here are some fundamental objectives that Sandpolis tries to achieve:-
1. compatible with as many operating systems as possible
2. #flexible, configurable, and easily extensible to niche applications via #plugins
3. uncompromising on #performance and #security
4. low latency and high concurrency
5. user-friendly
#Download #Link:-
https://github.com/Subterranean-Security/Sandpolis
Sandpolis:-- #Ultimate #Remote #Management #utility.
#Sandpolis is a remote administration platform for #servers, #desktop #computers, and anything in-between.
Sandpolis is designed for #sysadmins and #enthusiasts but can be used by anyone once set up. Most users will use Sandpolis via the #JavaFX desktop application or the #iOS #mobile #application.
⚡️Sandpolis is unfinished and therefore should only be used in a #secure #testing environment! ⚡️
Here are some fundamental objectives that Sandpolis tries to achieve:-
1. compatible with as many operating systems as possible
2. #flexible, configurable, and easily extensible to niche applications via #plugins
3. uncompromising on #performance and #security
4. low latency and high concurrency
5. user-friendly
#Download #Link:-
https://github.com/Subterranean-Security/Sandpolis
#Sandpolis is a remote administration platform for #servers, #desktop #computers, and anything in-between.
Sandpolis is designed for #sysadmins and #enthusiasts but can be used by anyone once set up. Most users will use Sandpolis via the #JavaFX desktop application or the #iOS #mobile #application.
⚡️Sandpolis is unfinished and therefore should only be used in a #secure #testing environment! ⚡️
Here are some fundamental objectives that Sandpolis tries to achieve:-
1. compatible with as many operating systems as possible
2. #flexible, configurable, and easily extensible to niche applications via #plugins
3. uncompromising on #performance and #security
4. low latency and high concurrency
5. user-friendly
#Download #Link:-
https://github.com/Subterranean-Security/Sandpolis
Sandpolis:-- #Ultimate #Remote #Management #utility.
#Sandpolis is a remote administration platform for #servers, #desktop #computers, and anything in-between.
Sandpolis is designed for #sysadmins and #enthusiasts but can be used by anyone once set up. Most users will use Sandpolis via the #JavaFX desktop application or the #iOS #mobile #application.
⚡️Sandpolis is unfinished and therefore should only be used in a #secure #testing environment! ⚡️
Here are some fundamental objectives that Sandpolis tries to achieve:-
1. compatible with as many operating systems as possible
2. #flexible, configurable, and easily extensible to niche applications via #plugins
3. uncompromising on #performance and #security
4. low latency and high concurrency
5. user-friendly
#Download #Link:-
https://github.com/Subterranean-Security/Sandpolis
AttackSurfaceMapper:-- #AttackSurfaceMapper is a #tool that aims to #automate the #reconnaissance #process.
Attack Surface Mapper is a reconnaissance tool that uses a mixture of #opensource #intelligence and #active techniques to expand the attack surface of your target. You feed in a mixture of one or more domains, #subdomains, and IP addresses and it uses numerous techniques to find more targets. It #enumerates subdomains with #bruteforcing and passive lookups, Other IPs of the same network block owner, IPs that have multiple domain names pointing to them and so on.
Once the target list is fully expanded it performs passive reconnaissance on them, taking screenshots of #websites, generating visual #maps, looking up credentials in public breaches, passive port scanning with #Shodan and scraping #employees from #LinkedIn.
Add optional API keys to enable more data gathering
Register and obtain an API key from:-
1. #VirusTotal
2. #ShodanIO
3. #HunterIO
4. #WeLeakInfo
5. LinkedIn
6. #GrayHatWarfare
#Download #Link:-
https://github.com/superhedgy/AttackSurfaceMapper
AttackSurfaceMapper:-- #AttackSurfaceMapper is a #tool that aims to #automate the #reconnaissance #process.
Attack Surface Mapper is a reconnaissance tool that uses a mixture of #opensource #intelligence and #active techniques to expand the attack surface of your target. You feed in a mixture of one or more domains, #subdomains, and IP addresses and it uses numerous techniques to find more targets. It #enumerates subdomains with #bruteforcing and passive lookups, Other IPs of the same network block owner, IPs that have multiple domain names pointing to them and so on.
Once the target list is fully expanded it performs passive reconnaissance on them, taking screenshots of #websites, generating visual #maps, looking up credentials in public breaches, passive port scanning with #Shodan and scraping #employees from #LinkedIn.
Add optional API keys to enable more data gathering
Register and obtain an API key from:-
1. #VirusTotal
2. #ShodanIO
3. #HunterIO
4. #WeLeakInfo
5. LinkedIn
6. #GrayHatWarfare
#Download #Link:-
https://github.com/superhedgy/AttackSurfaceMapper
Attack Surface Mapper is a reconnaissance tool that uses a mixture of #opensource #intelligence and #active techniques to expand the attack surface of your target. You feed in a mixture of one or more domains, #subdomains, and IP addresses and it uses numerous techniques to find more targets. It #enumerates subdomains with #bruteforcing and passive lookups, Other IPs of the same network block owner, IPs that have multiple domain names pointing to them and so on.
Once the target list is fully expanded it performs passive reconnaissance on them, taking screenshots of #websites, generating visual #maps, looking up credentials in public breaches, passive port scanning with #Shodan and scraping #employees from #LinkedIn.
Add optional API keys to enable more data gathering
Register and obtain an API key from:-
1. #VirusTotal
2. #ShodanIO
3. #HunterIO
4. #WeLeakInfo
5. LinkedIn
6. #GrayHatWarfare
#Download #Link:-
https://github.com/superhedgy/AttackSurfaceMapper
AttackSurfaceMapper:-- #AttackSurfaceMapper is a #tool that aims to #automate the #reconnaissance #process.
Attack Surface Mapper is a reconnaissance tool that uses a mixture of #opensource #intelligence and #active techniques to expand the attack surface of your target. You feed in a mixture of one or more domains, #subdomains, and IP addresses and it uses numerous techniques to find more targets. It #enumerates subdomains with #bruteforcing and passive lookups, Other IPs of the same network block owner, IPs that have multiple domain names pointing to them and so on.
Once the target list is fully expanded it performs passive reconnaissance on them, taking screenshots of #websites, generating visual #maps, looking up credentials in public breaches, passive port scanning with #Shodan and scraping #employees from #LinkedIn.
Add optional API keys to enable more data gathering
Register and obtain an API key from:-
1. #VirusTotal
2. #ShodanIO
3. #HunterIO
4. #WeLeakInfo
5. LinkedIn
6. #GrayHatWarfare
#Download #Link:-
https://github.com/superhedgy/AttackSurfaceMapper
Forwarded from Yemen Cyber Army
عُدنا بعد الحذف
القناة الرسمية والوحيدة على تلجرام
#لبلاك_هات_الإسلامية
https://t.me/BLACK_HAT_ISLAMIIC
#BLACK_HAT
القناة الرسمية والوحيدة على تلجرام
#لبلاك_هات_الإسلامية
https://t.me/BLACK_HAT_ISLAMIIC
#BLACK_HAT
Telegram
BLACK HAT ISLAMIC
@BLACK_HAT_ISLAMIIC
Forwarded from Termux CS
Photos from National Cyber Security Services's post
ClobberTime:-- #ClobberTime is a 3graphical frontend that provides functionality for the manipulation of #MAC (Modified, Accessed, Created) #timestamps during Windows Red Team or #Pentesting #engagements, without modifying current #system time and without invoking the #traditional timestomp binary. It is also designed as an #educational tool to demonstrate the difference between userland timestamps (which can be easily manipulated) and timestamps recorded in the #filesystem MFT.
#Windows #RedTeam
#Downlaod #Link:-
https://github.com/vhoudoverdov/Windows-RedTeam/tree/master/ClobberTime
ClobberTime:-- #ClobberTime is a 3graphical frontend that provides functionality for the manipulation of #MAC (Modified, Accessed, Created) #timestamps during Windows Red Team or #Pentesting #engagements, without modifying current #system time and without invoking the #traditional timestomp binary. It is also designed as an #educational tool to demonstrate the difference between userland timestamps (which can be easily manipulated) and timestamps recorded in the #filesystem MFT.
#Windows #RedTeam
#Downlaod #Link:-
https://github.com/vhoudoverdov/Windows-RedTeam/tree/master/ClobberTime
Forwarded from Yemen Cyber Army
دليل قنواتنا
t.me/BLACK_HAT_FR
t.me/BLACK_HAT_FR
Telegram
دليل قنوات SPIDER TEAM
دليل قنوات SPIDER TEAM
@Spider_Team00
@Spider_Team00
Expo:-- An #opensource platform for making #universal #native apps with #React. Expo runs on #Android, #iOS, and the #web.
Expo is an open-source platform for making universal native apps that run on Android, iOS, and the web. It includes a universal runtime and libraries that let you build native apps by writing #React and #JavaScript. This repository is where the Expo client #software is #developed and includes the client apps, modules, apps, and more. The Expo #CLI repository contains the Expo #development #tools.
#Download #Link:-
https://github.com/expo/expo
Expo:-- An #opensource platform for making #universal #native apps with #React. Expo runs on #Android, #iOS, and the #web.
Expo is an open-source platform for making universal native apps that run on Android, iOS, and the web. It includes a universal runtime and libraries that let you build native apps by writing #React and #JavaScript. This repository is where the Expo client #software is #developed and includes the client apps, modules, apps, and more. The Expo #CLI repository contains the Expo #development #tools.
#Download #Link:-
https://github.com/expo/expo
Expo is an open-source platform for making universal native apps that run on Android, iOS, and the web. It includes a universal runtime and libraries that let you build native apps by writing #React and #JavaScript. This repository is where the Expo client #software is #developed and includes the client apps, modules, apps, and more. The Expo #CLI repository contains the Expo #development #tools.
#Download #Link:-
https://github.com/expo/expo
Expo:-- An #opensource platform for making #universal #native apps with #React. Expo runs on #Android, #iOS, and the #web.
Expo is an open-source platform for making universal native apps that run on Android, iOS, and the web. It includes a universal runtime and libraries that let you build native apps by writing #React and #JavaScript. This repository is where the Expo client #software is #developed and includes the client apps, modules, apps, and more. The Expo #CLI repository contains the Expo #development #tools.
#Download #Link:-
https://github.com/expo/expo