The Hacking Library
351 subscribers
874 photos
19 videos
44 files
1.3K links
محتوي القناه هو عباره عن تجميع
القناه عباره عن ارشيف للهكرز الأخلاقيات وغير الأخلاقيين
استمتعوا😀👍
Download Telegram
(Feed generated with FetchRSS (http://fetchrss.com/))
Photos from National Cyber Security Services's post


TheFatRat:-- Updated new version

#TheFatrat a massive #exploiting tool!

Easy tool to generate #backdoor and easy tool to post-exploitation attacks like #browser attack and etc. This tool compiles a #malware with popular #payload and then the compiled malware can be executed on #windows, #android, #mac. The malware that created with this tool also has an ability to #bypass most #AV #software.

Features:-
1. Fully Automating #MSFvenom & #Metasploit.
2. Local or remote listener Generation.
3. Easily Make Backdoor by category Operating System.
4. Generate #payloads in Various formats.
5. Bypass anti-virus backdoors.
6. File pumper that you can use for increasing the size of your files.
7. The ability to detect external #IP & Interface address.
8. Automatically creates AutoRun files for #USB / CDROM exploitation.

#Download #Link:-

https://github.com/Screetsec/TheFatRat
(Feed generated with FetchRSS (http://fetchrss.com/))
Photos from National Cyber Security Services's post


Onex v0.1:-- Onex is a #hacking #tool installer and package manager for #hackers. Onex is a library of all hacking tools for Termux and other #Linux distributions. onex can install any third-party tool or any hacking tool for you.

"onex a hacking tools library." Onex is a #kali Linux hacking tools installer for #termux and other Linux distribution. It's a package manager for hackers. onex manages large numbers of hacking tools that can be installed on a single click. Using onex, you can install all hacking tools in Termux and other Linux based distributions. onex can install more than 370+ kali Linux hacking tools. use onex install [tool_name] command to install any hacking tool.

onex works on any of the following operating systems:-
1. #Android (Using the Termux App)
2. Linux (Linux Based Systems)

#Download #Link:-

https://github.com/rajkumardusad/onex
(Feed generated with FetchRSS (http://fetchrss.com/))
InjuredAndroid:-- A #Vulnerable #Android #Application That Shows Simple Examples Of #Vulnerabilities In A #CTF Style.

Setup for a physical device:-
1. Download injuredandroid.apk from #Github
2. Enable #USB debugging on your Android test phone.
3. Connect your phone and your pc with a #USB cable.
4. Install via ADB. ADB install injuredandroid.apk. Note: You need to use the absolute path to the .apk file or be in the same directory.

Setup for an Android #Emulator using Android Studio:-
1. Download the #APK file.
2. Start the emulator from Android Studio (I recommend downloading an emulator with #Google #APIs so #root adb can be enabled).
3. Drag and drop the .apk file on the emulator and injuredandroid.apk will install.

#Download #Link:-

https://github.com/B3nac/InjuredAndroid


InjuredAndroid:-- A #Vulnerable #Android #Application That Shows Simple Examples Of #Vulnerabilities In A #CTF Style.

Setup for a physical device:-
1. Download injuredandroid.apk from #Github
2. Enable #USB debugging on your Android test phone.
3. Connect your phone and your pc with a #USB cable.
4. Install via ADB. ADB install injuredandroid.apk. Note: You need to use the absolute path to the .apk file or be in the same directory.

Setup for an Android #Emulator using Android Studio:-
1. Download the #APK file.
2. Start the emulator from Android Studio (I recommend downloading an emulator with #Google #APIs so #root adb can be enabled).
3. Drag and drop the .apk file on the emulator and injuredandroid.apk will install.

#Download #Link:-

https://github.com/B3nac/InjuredAndroid
(Feed generated with FetchRSS (http://fetchrss.com/))
Photos from National Cyber Security Services's post


Ghost Framework:-- #Android #post #exploitation #framework that uses an Android Debug Bridge to #remotely access an Android device. #Ghost Framework gives you the power and convenience of #remote Android #device #administration.

Why ghost framework?
1. Accessing device shell
INFO: Ghost Framework can be used to access the remote
Android device #shell without using #OpenSSH or other protocols.

2. Emulating device button presses
INFO: Ghost Framework can be used to emulate
button presses on the remote Android device.

3. Removing device password
INFO: Ghost Framework can be used to remove the
remote Android device #password if it was forgotten.

#Downlaod #Link:-

https://github.com/entynetproject/ghost
(Feed generated with FetchRSS (http://fetchrss.com/))
#VirusTotal is very excited to announce a #beta release of a new #plugin for #IDA Pro v7 which integrates VT Intelligence’s content search directly into IDA.

This plugin adds a new "VirusTotal" entry to the IDA Pro context menu (#disassembly and strings #windows), enabling you to search for similar or exact #data on VirusTotal. It translates the user selection into a query that #VTGrep understands.

#Link:-

https://blog.virustotal.com/2020/02/official-virustotal-plugin-for-ida-pro-7.html?m=1


#VirusTotal is very excited to announce a #beta release of a new #plugin for #IDA Pro v7 which integrates VT Intelligence’s content search directly into IDA.

This plugin adds a new "VirusTotal" entry to the IDA Pro context menu (#disassembly and strings #windows), enabling you to search for similar or exact #data on VirusTotal. It translates the user selection into a query that #VTGrep understands.

#Link:-

https://blog.virustotal.com/2020/02/official-virustotal-plugin-for-ida-pro-7.html?m=1
(Feed generated with FetchRSS (http://fetchrss.com/))
#Django-DefectDojo:--

#DefectDojo is an #open-source #application #vulnerability correlation and #security #orchestration #tool.

DefectDojo is a security program and vulnerability #management tool. DefectDojo allows you to manage your application #security #program, maintain product and application #information, schedule #scans, triage #vulnerabilities and push findings into #defect trackers. Consolidate your findings into one source of truth with #DefectDojo.

#Download #Link:-

https://github.com/DefectDojo/django-DefectDojo


#Django-DefectDojo:--

#DefectDojo is an #open-source #application #vulnerability correlation and #security #orchestration #tool.

DefectDojo is a security program and vulnerability #management tool. DefectDojo allows you to manage your application #security #program, maintain product and application #information, schedule #scans, triage #vulnerabilities and push findings into #defect trackers. Consolidate your findings into one source of truth with #DefectDojo.

#Download #Link:-

https://github.com/DefectDojo/django-DefectDojo
(Feed generated with FetchRSS (http://fetchrss.com/))