The Hacking Library
350 subscribers
874 photos
19 videos
44 files
1.3K links
محتوي القناه هو عباره عن تجميع
القناه عباره عن ارشيف للهكرز الأخلاقيات وغير الأخلاقيين
استمتعوا😀👍
Download Telegram
4K-Botnet:-- A #simple and #easy to use #JS #Botnet.

How to #Setup:-
1. Clone repository
2. Upload the "Botnet" folder to your #webserver
3. Edit "bot.js"
Change the "SERVER_URL" variable to your #website's #URL
Change the "api_dev_key" variable to match your Pastebin's account key
Change the "api_user_key" variable to match your Pastebin's account key
4. Done

How to use it?
1. Edit the "cmds.txt" file - Each #command on a separate line
2. Inject "bot.js" into the victim's #webpage

#Download #Link:-

https://github.com/4k-developer/4K-Botnet


4K-Botnet:-- A #simple and #easy to use #JS #Botnet.

How to #Setup:-
1. Clone repository
2. Upload the "Botnet" folder to your #webserver
3. Edit "bot.js"
Change the "SERVER_URL" variable to your #website's #URL
Change the "api_dev_key" variable to match your Pastebin's account key
Change the "api_user_key" variable to match your Pastebin's account key
4. Done

How to use it?
1. Edit the "cmds.txt" file - Each #command on a separate line
2. Inject "bot.js" into the victim's #webpage

#Download #Link:-

https://github.com/4k-developer/4K-Botnet
(Feed generated with FetchRSS (http://fetchrss.com/))
Photos from National Cyber Security Services's post


Malcolm:-- #Malcolm is a #powerful, easily #deployable #network #traffic #analysis #tool suite for full #packet #capture artifacts (#PCAP files) and #Zeek logs.

Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind:-

1. Easy to use:– Malcolm accepts network traffic #data in the form of full packet capture (PCAP) files and Zeek (formerly Bro) logs. These artifacts can be uploaded via a simple browser-based interface or captured live and forwarded to Malcolm using lightweight forwarders. In either case, the data is #automatically normalized, #enriched, and correlated for analysis.

2. Powerful traffic analysis:– Visibility into network communications is provided through two intuitive interfaces: #Kibana, a flexible data #visualization plugin with dozens of prebuilt #dashboards providing an at-a-glance overview of network protocols; and Moloch, a powerful tool for finding and identifying the network #sessions #comprising suspected security incidents.

3. Streamlined deployment:– Malcolm operates as a cluster of #Docker containers, isolated #sandboxes which each serves a dedicated function of the #system. This Docker-based deployment model, combined with a few simple scripts for setup and run-time management, makes Malcolm suitable to be deployed quickly across a variety of platforms and use cases, whether it be for long-term deployment on a #Linux #server in a #security operations center (SOC) or for incident response on a #Macbook for an individual engagement.

4. Secure #communications:– All #communications with Malcolm, both from the user interface and from #remote log forwarders, are secured with industry-standard #encryption #protocols.

5. Permissive license:– Malcolm is comprised of several widely used open-source tools, making it an attractive alternative to security solutions requiring paid #licenses.

6. Expanding control systems visibility:– While Malcolm is great for general-purpose network traffic analysis, its creators see a particular need in the #community for tools providing insight into protocols used in industrial control systems (ICS) environments. Ongoing Malcolm development will aim to provide additional parsers for common #ICS protocols.

#Download #Link:-

https://github.com/idaholab/Malcolm
(Feed generated with FetchRSS (http://fetchrss.com/))
Forwarded from NusurTech 2 ©️
قناة المبرمج احمد قيصر سوف تقدم لكم
اقوى دورة في الوطن العربي بتحديات CTF
و بدأنا بنشر اول درس من الدورة و يمكنكم
متابعه الدورة على القناة الخاصة به على يوتيوب

رابط الدرس االاول ctf : https://youtu.be/DhY4S3qG8Bg
WindowsSpyBlocker:-- #Block #spying and #tracking on #Windows

#WindowsSpyBlocker is an #application written in #Go and delivered as a single #executable to block spying and tracking on Windows #systems.

The approach of this project is to capture and interpret #network #traffic based on a set of #tools. Depending on the interactions between services and source or #destination of traffic, rules are created and sorted by #assignment.

#Downlaod #Link:-

https://github.com/crazy-max/WindowsSpyBlocker


WindowsSpyBlocker:-- #Block #spying and #tracking on #Windows

#WindowsSpyBlocker is an #application written in #Go and delivered as a single #executable to block spying and tracking on Windows #systems.

The approach of this project is to capture and interpret #network #traffic based on a set of #tools. Depending on the interactions between services and source or #destination of traffic, rules are created and sorted by #assignment.

#Downlaod #Link:-

https://github.com/crazy-max/WindowsSpyBlocker
(Feed generated with FetchRSS (http://fetchrss.com/))
MifareClassicTool:-- An #Android #NFC app for reading, writing, #analyzing, etc. MIFARE Classic #RFID tags.

Features:--
1. Read MIFARE Classic tags
2. Save, edit and share the tag #data you read
3. Write to MIFARE Classic tags (block-wise)
4. Clone MIFARE Classic tags
(Write #dump of a tag to another tag; write 'dump-wise')
5. Key #management based on dictionary-attack
(Write the keys you know in a file (dictionary).
MCT will try to authenticate with these
keys against all sectors and read as much as possible.
See chapter Getting Started.)
6. Format a tag back to the factory/delivery state
7. Write the manufacturer block of special MIFARE Classic tags
8. Use external NFC readers like ACR 122U
(See the Help & Info section for more information.)
9. Create, edit, save and share key files (dictionaries)
10. Decode & Encode MIFARE Classic Value Blocks
11. Decode & Encode MIFARE Classic Access Conditions
12. Compare dumps (Diff Tool)
13. Display generic tag information
14. Display the tag data as highlighted hex
15. Display the tag data as 7-Bit US-ASCII
16. Display the MIFARE Classic Access Conditions as a table
17. Display MIFARE Classic Value Blocks as an integer
18. In-App (offline) help and #information
19. It's free #software (#opensource). ;)

#Download #Link:-

https://github.com/ikarus23/MifareClassicTool


MifareClassicTool:-- An #Android #NFC app for reading, writing, #analyzing, etc. MIFARE Classic #RFID tags.

Features:--
1. Read MIFARE Classic tags
2. Save, edit and share the tag #data you read
3. Write to MIFARE Classic tags (block-wise)
4. Clone MIFARE Classic tags
(Write #dump of a tag to another tag; write 'dump-wise')
5. Key #management based on dictionary-attack
(Write the keys you know in a file (dictionary).
MCT will try to authenticate with these
keys against all sectors and read as much as possible.
See chapter Getting Started.)
6. Format a tag back to the factory/delivery state
7. Write the manufacturer block of special MIFARE Classic tags
8. Use external NFC readers like ACR 122U
(See the Help & Info section for more information.)
9. Create, edit, save and share key files (dictionaries)
10. Decode & Encode MIFARE Classic Value Blocks
11. Decode & Encode MIFARE Classic Access Conditions
12. Compare dumps (Diff Tool)
13. Display generic tag information
14. Display the tag data as highlighted hex
15. Display the tag data as 7-Bit US-ASCII
16. Display the MIFARE Classic Access Conditions as a table
17. Display MIFARE Classic Value Blocks as an integer
18. In-App (offline) help and #information
19. It's free #software (#opensource). ;)

#Download #Link:-

https://github.com/ikarus23/MifareClassicTool
(Feed generated with FetchRSS (http://fetchrss.com/))
نرحب بكم للإنضمام الى مجموعة الدردشة العامة في الديب ويب

#Arab_Hack_Chat

http://tzpioaxj726d6mtr.onion/


http://lbvm7gf6n532tkfdcoi46wjmhqeb45z57f7elma5jqyb7qwidzhasyad.onion
Lockwise-ios:-- #Firefox's #Lockwise #app for #iOS and #Android.

#Securely access the #passwords you’ve saved in Firefox from anywhere — even outside of the #browser.

Features:-
1. 256-bit #encryption protects you while synchronizing
2. Get to your passwords securely with Face or Touch ID
3. Your #privacy comes first. We keep your #data safe, never sold.

#Download #Link:-

https://www.mozilla.org/en-GB/firefox/lockwise/


Lockwise-ios:-- #Firefox's #Lockwise #app for #iOS and #Android.

#Securely access the #passwords you’ve saved in Firefox from anywhere — even outside of the #browser.

Features:-
1. 256-bit #encryption protects you while synchronizing
2. Get to your passwords securely with Face or Touch ID
3. Your #privacy comes first. We keep your #data safe, never sold.

#Download #Link:-

https://www.mozilla.org/en-GB/firefox/lockwise/
(Feed generated with FetchRSS (http://fetchrss.com/))
Photos from National Cyber Security Services's post


Faceswap:-- A #tool that #utilizes #deep #learning to #recognize and #swap #faces in #pictures and #videos.

#FaceSwap has #ethical uses.
1. FaceSwap is not for #creating #inappropriate #content.
2. FaceSwap is not for changing faces without consent or
with the intent of hiding its use.
3. FaceSwap is not for any illicit, #unethical, or
questionable purposes.
4. FaceSwap exists to #experiment and #discovers #AI
#techniques, for #social or #political commentary, for
#movies, and for any number of ethical and reasonable
uses.

#Download #Link:-

https://github.com/deepfakes/faceswap
(Feed generated with FetchRSS (http://fetchrss.com/))