The Hacking Library
351 subscribers
874 photos
19 videos
44 files
1.3K links
محتوي القناه هو عباره عن تجميع
القناه عباره عن ارشيف للهكرز الأخلاقيات وغير الأخلاقيين
استمتعوا😀👍
Download Telegram
(Feed generated with FetchRSS (http://fetchrss.com/))
Photos from National Cyber Security Services's post


Memhunter:-- Live #Hunting Of #Code #Injection #Techniques.

Memhunter is an endpoint sensor tool that is specialized in detecing resident #malware, improving the threat hunter analysis process and remediation times. The tool detects and reports memory-resident malware living on endpoint processes. Memhunter detects known #malicious #memory injection techniques. The detection #process is performed through live analysis and without needing memory dumps. The tool was designed as a replacement for memory #forensic #volatility #plugins such as malfind and hollowfind. The idea of not requiring memory dumps helps on performing the memory-resident malware threat hunting at scale, without manual #analysis, and without the complex #infrastructure needed to move dumps to forensic environments.

#Download #Link:-

https://github.com/marcosd4h/memhunter
(Feed generated with FetchRSS (http://fetchrss.com/))
Forwarded from NusurTech 2 ©️
ستبدأ قناة احمد قيصر في بايثون من البداية الي الاحتراف

https://youtu.be/VfzEriil3Go
Photos from National Cyber Security Services's post


Maltrail:-- #Malicious #traffic #detection #system.

Maltrail is a #malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user-defined lists, where trail can be anything from #domain name (e.g. zvpprsensinaix.com for #Banjori malware), URL (e.g. hXXp://109.162.38.120/harsh02.exe for known malicious executable), IP address (e.g. 185.130.5.231 for known attacker) or #HTTP User-Agent header value (e.g. #sqlmap for automatic #SQL #injection and #database takeover tool). Also, it uses (optional) advanced heuristic #mechanisms that can help in the discovery of unknown threats (e.g. new #malware).

#Downlaod #Link:-

https://github.com/stamparm/maltrail
(Feed generated with FetchRSS (http://fetchrss.com/))
OSINT-Framework- #OSINT #framework focused on #gathering #information from free #tools or #resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.

The framework was originally created with an information #security point of view. Since then, the response from other fields and disciplines has been incredible.

#Download #Link:-

https://github.com/lockfale/OSINT-Framework


OSINT-Framework- #OSINT #framework focused on #gathering #information from free #tools or #resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.

The framework was originally created with an information #security point of view. Since then, the response from other fields and disciplines has been incredible.

#Download #Link:-

https://github.com/lockfale/OSINT-Framework
(Feed generated with FetchRSS (http://fetchrss.com/))
secDevLabs:-- A #laboratory for learning #secure #web #development in a #practical manner.

By provisioning local #environments via docker-compose, you will learn how the most #critical web #application #security risks are #exploited and how these #vulnerable codes can be fixed to mitigate them.

After forking this repository, you will find multiple intended vulnerable apps based on real-life scenarios in various languages such as #Golang, #Python and #PHP. A good start would be installing the ones you are most familiar with. You can find instructions to do this on each of the apps.

#Download #Link:-

https://github.com/globocom/secDevLabs


secDevLabs:-- A #laboratory for learning #secure #web #development in a #practical manner.

By provisioning local #environments via docker-compose, you will learn how the most #critical web #application #security risks are #exploited and how these #vulnerable codes can be fixed to mitigate them.

After forking this repository, you will find multiple intended vulnerable apps based on real-life scenarios in various languages such as #Golang, #Python and #PHP. A good start would be installing the ones you are most familiar with. You can find instructions to do this on each of the apps.

#Download #Link:-

https://github.com/globocom/secDevLabs
(Feed generated with FetchRSS (http://fetchrss.com/))
Photos from National Cyber Security Services's post


UFONet - #Denial of #Service Toolkit.

#UFONet is a #toolkit designed to launch #DDoS and #DoS #attacks.it runs on many platforms. It requires #Python (>=3) and requires :-#whois,#pycurl,#geoip,#crypto,#scanpy,#requests.

#Download #Link:-

https://github.com/epsylon/ufonet
(Feed generated with FetchRSS (http://fetchrss.com/))
Photos from National Cyber Security Services's post


hidden-tear- #ransomware #open-#sources

It's a ransomware-like file #crypter sample which can be modified for specific purposes.

Features:-

-Uses #AES #algorithm to #encrypt files.
-Sends encryption key to a #server.
-Encrypted files can be #decrypt in #decrypter program with encryption key.
-Creates a text file in Desktop with given message.
-Small file size (12 KB)
-Doesn't detected to #antivirus programs

#Download #Link:-

https://github.com/goliate/hidden-tear
(Feed generated with FetchRSS (http://fetchrss.com/))