The Hacking Library
350 subscribers
874 photos
19 videos
44 files
1.3K links
محتوي القناه هو عباره عن تجميع
القناه عباره عن ارشيف للهكرز الأخلاقيات وغير الأخلاقيين
استمتعوا😀👍
Download Telegram
احترسو ....⛔️
Disable-Control-Panel:-- Example of disabling the #control panel via #registry #manipulation.

#Access to the #controlpanel is dictated by a #flag in the registry. An incredible obtrusive way to disable it is by modifying the value of the key.

The key in question resides at

Key Location: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer

with

Key Name: NoControlPanel

Setting this to 1 should prevent access to the control panel

#Download #Link:-

https://github.com/ThomasThelen/Disable-Control-Panel


Disable-Control-Panel:-- Example of disabling the #control panel via #registry #manipulation.

#Access to the #controlpanel is dictated by a #flag in the registry. An incredible obtrusive way to disable it is by modifying the value of the key.

The key in question resides at

Key Location: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer

with

Key Name: NoControlPanel

Setting this to 1 should prevent access to the control panel

#Download #Link:-

https://github.com/ThomasThelen/Disable-Control-Panel
(Feed generated with FetchRSS (http://fetchrss.com/))
Photos from National Cyber Security Services's post


Tishna:-- Complete #Automated #pentest #framework for #Servers, #Application #Layer to #Web #Security.

Software have 61 Options with full #automation and can be used for web security #swiss #knife.

Brief Introduction:-
1. #Tishna is useful in #Banks, #Private #Organisations and #Ethical #hacker personnel for legal #auditing.
2. It serves as a #defense method to find as much information possible for gaining unauthorized access and intrusion.
3. With the emergence of more #advanced #technology, cybercriminals have also found more ways to get into the system of many organizations.
4. Tishna #software can audit, servers and web-behavior.
5. Tishna can perform #Scanning & #Enumeration as much as possible of the target.
6. It’s the first step to stop #cyber #criminals by securing your Servers and Web Application Security.
7. Tishna is false positive free when there is something it will show no matter what, if it is not, it will give blank results rather error.

#Download #Link:-

https://github.com/haroonawanofficial/Tishna
(Feed generated with FetchRSS (http://fetchrss.com/))
Yeah!!😅


Yeah!!😅
(Feed generated with FetchRSS (http://fetchrss.com/))
S3Tk:-- A #Security #Toolkit For #Amazon S3.

Scan your #buckets for:-

1. #ACL open to public
2. policy open to public
3. public access blocked
4. logging enabled
5. versioning enabled
6. default #encryption enabled

#Download #Link:-

https://github.com/ankane/s3tk


S3Tk:-- A #Security #Toolkit For #Amazon S3.

Scan your #buckets for:-

1. #ACL open to public
2. policy open to public
3. public access blocked
4. logging enabled
5. versioning enabled
6. default #encryption enabled

#Download #Link:-

https://github.com/ankane/s3tk
(Feed generated with FetchRSS (http://fetchrss.com/))
Seccubus:-- #Easily #automated #vulnerability #scanning, #reporting, and #analysis.

#Seccubus automates regular vulnerability scans with various tools and aids #security people in the fast analysis of its output, both on the first scan and on repeated scans.

Seccubus V2 works with the following scanners:-
1. #Nessus
2. #OpenVAS
3. #Skipfish
4. #Medusa (local and remote)
5. #Nikto (local and remote)
6. #NMap (local and remote)
7. #OWASP-ZAP (local and remote)
8. #SSLyze
9. #Medusa
10. #Qualys #SSL labs
11. testssl.sh (local and remote)

#Download #Link:-

https://github.com/seccubus/seccubus


Seccubus:-- #Easily #automated #vulnerability #scanning, #reporting, and #analysis.

#Seccubus automates regular vulnerability scans with various tools and aids #security people in the fast analysis of its output, both on the first scan and on repeated scans.

Seccubus V2 works with the following scanners:-
1. #Nessus
2. #OpenVAS
3. #Skipfish
4. #Medusa (local and remote)
5. #Nikto (local and remote)
6. #NMap (local and remote)
7. #OWASP-ZAP (local and remote)
8. #SSLyze
9. #Medusa
10. #Qualys #SSL labs
11. testssl.sh (local and remote)

#Download #Link:-

https://github.com/seccubus/seccubus
(Feed generated with FetchRSS (http://fetchrss.com/))
nagiosxi-root-exploit:-- #POC which #exploits a #vulnerability within #Nagios XI (5.6.5) to #spawn a #root #shell

A vulnerability exists in Nagios XI <= 5.6.5 allowing an attacker to leverage an RCE to #escalate #privileges to root.
The exploit requires access to the server as the 'nagios' user, or CCM access via the web interface with permissions to manage #plugins.

A #PHP POC has been developed which #uploads a #payload resulting in a #reverse root shell.

#Usage:
php privesc.php --host=example.com --ssl=[true/false] --user=username --pass=password --reverseip=ip --reverseport=port

#Download #Link:-

https://github.com/jakgibb/nagiosxi-root-rce-exploit


nagiosxi-root-exploit:-- #POC which #exploits a #vulnerability within #Nagios XI (5.6.5) to #spawn a #root #shell

A vulnerability exists in Nagios XI
(Feed generated with FetchRSS (http://fetchrss.com/))
Photos from National Cyber Security Services's post


PwnDoc:-- #Pentesting #report generator.

#PwnDoc is a #pentest reporting #application making it simple and easy to write your findings and generate a customizable docx report. The main goal is to have more time to Pwn and less time to Doc by mutualizing data like #vulnerabilities between users.

#Download #Link:-

https://github.com/pwndoc/pwndoc