The Hacking Library
350 subscribers
874 photos
19 videos
44 files
1.3K links
محتوي القناه هو عباره عن تجميع
القناه عباره عن ارشيف للهكرز الأخلاقيات وغير الأخلاقيين
استمتعوا😀👍
Download Telegram
Forwarded from جامع النافع
كورس كيفبه برمجه فايروس الفديه
#حصري_جدا|
فكرة عن الدورة
تعلم كيف تبني فيروس فدية خبيث بحيث يمكنه التحايل على برامج مضادات الفيروسات ويقوم بمساومة المستخدم على ملفاته الهامة
ملحوظة : الدورة للاغراض العلمية والوقائية وغير مسموح باستخدامها في اضرار الاخرين
التحميل https://www.mr-lunix.ml/p/blog-page_30.html
الحجم 4.4 giga
لا تنسخ CH : @mr_lunixes
Photos from National Cyber Security Services's post


ReconCobra:-- Complete #Automated #Pentest #Framework for #Information #Gathering.

The software has 82 Options with full #automation and #powerful information gathering.

#Reconcobra is #Footprinting software for Ultimate Information Gathering
#Kali, #Parrot OS, #BlackArch, #Termux, #Android Led TV.

Introduction:-
1. ReconCobra is useful in #Banks, Private #Organisations and #Ethical #hacker #personnel for legal #auditing.
2. It serves as a defense method to find as much information possible for gaining unauthorized access and intrusion.
3. With the emergence of more advanced #technology, cybercriminals have also found more ways to get into the system of many organizations.
4. ReconCobra #software can #audit, #firewall behavior, if it is leaking backend machines/server and replying pings, it can find internal and external networks where many software’s like #ERP, mail firewalls are installed, exposing servers so it does Footprinting, Scanning & #Enumeration as much as possible of target, to discover and collect most possible information like username, #web #technologies, files, endpoint, #API and much more.
5. It’s the first step to stop #cyber #criminals by securing your Infrastructural Information Gathering leakage. ReconCobra is false positive free when there is something it will show no matter what, if it is not, it will give blank results rather error.

#Download #Link:-

https://github.com/haroonawanofficial/ReconCobra
(Feed generated with FetchRSS (http://fetchrss.com/))
Brakeman:-- A #static #analysis #security #vulnerability #scanner for #Ruby on #Rails #applications

#Compatibility:-
Brakeman should work with any version of Rails from 2.3.x to 6.x.

#Brakeman can analyze #code written with Ruby 1.8 syntax and #newer but requires at least Ruby 2.3.0 to run.

Brakeman assigns a confidence level to each #warning. This provides a rough estimate of how certain the tool is that a given warning is actually a problem. Naturally, these ratings should not be taken as absolute truth.

There are three levels of confidence:-

1. High - Either this is a simple warning (#boolean value) or user input is very likely being used in unsafe ways.
2. Medium - This generally indicates an unsafe use of a variable, but the #variable may or may not be user input.
3. Weak - Typically means user input was indirectly used in a potentially unsafe manner.

#Download #Link:-

https://github.com/presidentbeef/brakeman


Brakeman:-- A #static #analysis #security #vulnerability #scanner for #Ruby on #Rails #applications

#Compatibility:-
Brakeman should work with any version of Rails from 2.3.x to 6.x.

#Brakeman can analyze #code written with Ruby 1.8 syntax and #newer but requires at least Ruby 2.3.0 to run.

Brakeman assigns a confidence level to each #warning. This provides a rough estimate of how certain the tool is that a given warning is actually a problem. Naturally, these ratings should not be taken as absolute truth.

There are three levels of confidence:-

1. High - Either this is a simple warning (#boolean value) or user input is very likely being used in unsafe ways.
2. Medium - This generally indicates an unsafe use of a variable, but the #variable may or may not be user input.
3. Weak - Typically means user input was indirectly used in a potentially unsafe manner.

#Download #Link:-

https://github.com/presidentbeef/brakeman
(Feed generated with FetchRSS (http://fetchrss.com/))
4K-Botnet:-- A #simple and #easy to use #JS #Botnet.

How to #Setup:-
1. Clone repository
2. Upload the "Botnet" folder to your #webserver
3. Edit "bot.js"
Change the "SERVER_URL" variable to your #website's #URL
Change the "api_dev_key" variable to match your Pastebin's account key
Change the "api_user_key" variable to match your Pastebin's account key
4. Done

How to use it?
1. Edit the "cmds.txt" file - Each #command on a separate line
2. Inject "bot.js" into the victim's #webpage

#Download #Link:-

https://github.com/4k-developer/4K-Botnet


4K-Botnet:-- A #simple and #easy to use #JS #Botnet.

How to #Setup:-
1. Clone repository
2. Upload the "Botnet" folder to your #webserver
3. Edit "bot.js"
Change the "SERVER_URL" variable to your #website's #URL
Change the "api_dev_key" variable to match your Pastebin's account key
Change the "api_user_key" variable to match your Pastebin's account key
4. Done

How to use it?
1. Edit the "cmds.txt" file - Each #command on a separate line
2. Inject "bot.js" into the victim's #webpage

#Download #Link:-

https://github.com/4k-developer/4K-Botnet
(Feed generated with FetchRSS (http://fetchrss.com/))
Photos from National Cyber Security Services's post


Malcolm:-- #Malcolm is a #powerful, easily #deployable #network #traffic #analysis #tool suite for full #packet #capture artifacts (#PCAP files) and #Zeek logs.

Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind:-

1. Easy to use:– Malcolm accepts network traffic #data in the form of full packet capture (PCAP) files and Zeek (formerly Bro) logs. These artifacts can be uploaded via a simple browser-based interface or captured live and forwarded to Malcolm using lightweight forwarders. In either case, the data is #automatically normalized, #enriched, and correlated for analysis.

2. Powerful traffic analysis:– Visibility into network communications is provided through two intuitive interfaces: #Kibana, a flexible data #visualization plugin with dozens of prebuilt #dashboards providing an at-a-glance overview of network protocols; and Moloch, a powerful tool for finding and identifying the network #sessions #comprising suspected security incidents.

3. Streamlined deployment:– Malcolm operates as a cluster of #Docker containers, isolated #sandboxes which each serves a dedicated function of the #system. This Docker-based deployment model, combined with a few simple scripts for setup and run-time management, makes Malcolm suitable to be deployed quickly across a variety of platforms and use cases, whether it be for long-term deployment on a #Linux #server in a #security operations center (SOC) or for incident response on a #Macbook for an individual engagement.

4. Secure #communications:– All #communications with Malcolm, both from the user interface and from #remote log forwarders, are secured with industry-standard #encryption #protocols.

5. Permissive license:– Malcolm is comprised of several widely used open-source tools, making it an attractive alternative to security solutions requiring paid #licenses.

6. Expanding control systems visibility:– While Malcolm is great for general-purpose network traffic analysis, its creators see a particular need in the #community for tools providing insight into protocols used in industrial control systems (ICS) environments. Ongoing Malcolm development will aim to provide additional parsers for common #ICS protocols.

#Download #Link:-

https://github.com/idaholab/Malcolm
(Feed generated with FetchRSS (http://fetchrss.com/))
Forwarded from NusurTech 2 ©️
قناة المبرمج احمد قيصر سوف تقدم لكم
اقوى دورة في الوطن العربي بتحديات CTF
و بدأنا بنشر اول درس من الدورة و يمكنكم
متابعه الدورة على القناة الخاصة به على يوتيوب

رابط الدرس االاول ctf : https://youtu.be/DhY4S3qG8Bg
WindowsSpyBlocker:-- #Block #spying and #tracking on #Windows

#WindowsSpyBlocker is an #application written in #Go and delivered as a single #executable to block spying and tracking on Windows #systems.

The approach of this project is to capture and interpret #network #traffic based on a set of #tools. Depending on the interactions between services and source or #destination of traffic, rules are created and sorted by #assignment.

#Downlaod #Link:-

https://github.com/crazy-max/WindowsSpyBlocker


WindowsSpyBlocker:-- #Block #spying and #tracking on #Windows

#WindowsSpyBlocker is an #application written in #Go and delivered as a single #executable to block spying and tracking on Windows #systems.

The approach of this project is to capture and interpret #network #traffic based on a set of #tools. Depending on the interactions between services and source or #destination of traffic, rules are created and sorted by #assignment.

#Downlaod #Link:-

https://github.com/crazy-max/WindowsSpyBlocker
(Feed generated with FetchRSS (http://fetchrss.com/))
MifareClassicTool:-- An #Android #NFC app for reading, writing, #analyzing, etc. MIFARE Classic #RFID tags.

Features:--
1. Read MIFARE Classic tags
2. Save, edit and share the tag #data you read
3. Write to MIFARE Classic tags (block-wise)
4. Clone MIFARE Classic tags
(Write #dump of a tag to another tag; write 'dump-wise')
5. Key #management based on dictionary-attack
(Write the keys you know in a file (dictionary).
MCT will try to authenticate with these
keys against all sectors and read as much as possible.
See chapter Getting Started.)
6. Format a tag back to the factory/delivery state
7. Write the manufacturer block of special MIFARE Classic tags
8. Use external NFC readers like ACR 122U
(See the Help & Info section for more information.)
9. Create, edit, save and share key files (dictionaries)
10. Decode & Encode MIFARE Classic Value Blocks
11. Decode & Encode MIFARE Classic Access Conditions
12. Compare dumps (Diff Tool)
13. Display generic tag information
14. Display the tag data as highlighted hex
15. Display the tag data as 7-Bit US-ASCII
16. Display the MIFARE Classic Access Conditions as a table
17. Display MIFARE Classic Value Blocks as an integer
18. In-App (offline) help and #information
19. It's free #software (#opensource). ;)

#Download #Link:-

https://github.com/ikarus23/MifareClassicTool


MifareClassicTool:-- An #Android #NFC app for reading, writing, #analyzing, etc. MIFARE Classic #RFID tags.

Features:--
1. Read MIFARE Classic tags
2. Save, edit and share the tag #data you read
3. Write to MIFARE Classic tags (block-wise)
4. Clone MIFARE Classic tags
(Write #dump of a tag to another tag; write 'dump-wise')
5. Key #management based on dictionary-attack
(Write the keys you know in a file (dictionary).
MCT will try to authenticate with these
keys against all sectors and read as much as possible.
See chapter Getting Started.)
6. Format a tag back to the factory/delivery state
7. Write the manufacturer block of special MIFARE Classic tags
8. Use external NFC readers like ACR 122U
(See the Help & Info section for more information.)
9. Create, edit, save and share key files (dictionaries)
10. Decode & Encode MIFARE Classic Value Blocks
11. Decode & Encode MIFARE Classic Access Conditions
12. Compare dumps (Diff Tool)
13. Display generic tag information
14. Display the tag data as highlighted hex
15. Display the tag data as 7-Bit US-ASCII
16. Display the MIFARE Classic Access Conditions as a table
17. Display MIFARE Classic Value Blocks as an integer
18. In-App (offline) help and #information
19. It's free #software (#opensource). ;)

#Download #Link:-

https://github.com/ikarus23/MifareClassicTool
(Feed generated with FetchRSS (http://fetchrss.com/))
نرحب بكم للإنضمام الى مجموعة الدردشة العامة في الديب ويب

#Arab_Hack_Chat

http://tzpioaxj726d6mtr.onion/


http://lbvm7gf6n532tkfdcoi46wjmhqeb45z57f7elma5jqyb7qwidzhasyad.onion