InjuredAndroid:-- A #Vulnerable #Android #Application That Shows Simple Examples Of #Vulnerabilities In A #CTF Style.
Setup for a physical device:-
1. Download injuredandroid.apk from #Github
2. Enable #USB debugging on your Android test phone.
3. Connect your phone and your pc with a #USB cable.
4. Install via ADB. ADB install injuredandroid.apk. Note: You need to use the absolute path to the .apk file or be in the same directory.
Setup for an Android #Emulator using Android Studio:-
1. Download the #APK file.
2. Start the emulator from Android Studio (I recommend downloading an emulator with #Google #APIs so #root adb can be enabled).
3. Drag and drop the .apk file on the emulator and injuredandroid.apk will install.
#Download #Link:-
https://github.com/B3nac/InjuredAndroid
InjuredAndroid:-- A #Vulnerable #Android #Application That Shows Simple Examples Of #Vulnerabilities In A #CTF Style.
Setup for a physical device:-
1. Download injuredandroid.apk from #Github
2. Enable #USB debugging on your Android test phone.
3. Connect your phone and your pc with a #USB cable.
4. Install via ADB. ADB install injuredandroid.apk. Note: You need to use the absolute path to the .apk file or be in the same directory.
Setup for an Android #Emulator using Android Studio:-
1. Download the #APK file.
2. Start the emulator from Android Studio (I recommend downloading an emulator with #Google #APIs so #root adb can be enabled).
3. Drag and drop the .apk file on the emulator and injuredandroid.apk will install.
#Download #Link:-
https://github.com/B3nac/InjuredAndroid
Setup for a physical device:-
1. Download injuredandroid.apk from #Github
2. Enable #USB debugging on your Android test phone.
3. Connect your phone and your pc with a #USB cable.
4. Install via ADB. ADB install injuredandroid.apk. Note: You need to use the absolute path to the .apk file or be in the same directory.
Setup for an Android #Emulator using Android Studio:-
1. Download the #APK file.
2. Start the emulator from Android Studio (I recommend downloading an emulator with #Google #APIs so #root adb can be enabled).
3. Drag and drop the .apk file on the emulator and injuredandroid.apk will install.
#Download #Link:-
https://github.com/B3nac/InjuredAndroid
InjuredAndroid:-- A #Vulnerable #Android #Application That Shows Simple Examples Of #Vulnerabilities In A #CTF Style.
Setup for a physical device:-
1. Download injuredandroid.apk from #Github
2. Enable #USB debugging on your Android test phone.
3. Connect your phone and your pc with a #USB cable.
4. Install via ADB. ADB install injuredandroid.apk. Note: You need to use the absolute path to the .apk file or be in the same directory.
Setup for an Android #Emulator using Android Studio:-
1. Download the #APK file.
2. Start the emulator from Android Studio (I recommend downloading an emulator with #Google #APIs so #root adb can be enabled).
3. Drag and drop the .apk file on the emulator and injuredandroid.apk will install.
#Download #Link:-
https://github.com/B3nac/InjuredAndroid
Photos from National Cyber Security Services's post
Ghost Framework:-- #Android #post #exploitation #framework that uses an Android Debug Bridge to #remotely access an Android device. #Ghost Framework gives you the power and convenience of #remote Android #device #administration.
Why ghost framework?
1. Accessing device shell
INFO: Ghost Framework can be used to access the remote
Android device #shell without using #OpenSSH or other protocols.
2. Emulating device button presses
INFO: Ghost Framework can be used to emulate
button presses on the remote Android device.
3. Removing device password
INFO: Ghost Framework can be used to remove the
remote Android device #password if it was forgotten.
#Downlaod #Link:-
https://github.com/entynetproject/ghost
Ghost Framework:-- #Android #post #exploitation #framework that uses an Android Debug Bridge to #remotely access an Android device. #Ghost Framework gives you the power and convenience of #remote Android #device #administration.
Why ghost framework?
1. Accessing device shell
INFO: Ghost Framework can be used to access the remote
Android device #shell without using #OpenSSH or other protocols.
2. Emulating device button presses
INFO: Ghost Framework can be used to emulate
button presses on the remote Android device.
3. Removing device password
INFO: Ghost Framework can be used to remove the
remote Android device #password if it was forgotten.
#Downlaod #Link:-
https://github.com/entynetproject/ghost
#VirusTotal is very excited to announce a #beta release of a new #plugin for #IDA Pro v7 which integrates VT Intelligence’s content search directly into IDA.
This plugin adds a new "VirusTotal" entry to the IDA Pro context menu (#disassembly and strings #windows), enabling you to search for similar or exact #data on VirusTotal. It translates the user selection into a query that #VTGrep understands.
#Link:-
https://blog.virustotal.com/2020/02/official-virustotal-plugin-for-ida-pro-7.html?m=1
#VirusTotal is very excited to announce a #beta release of a new #plugin for #IDA Pro v7 which integrates VT Intelligence’s content search directly into IDA.
This plugin adds a new "VirusTotal" entry to the IDA Pro context menu (#disassembly and strings #windows), enabling you to search for similar or exact #data on VirusTotal. It translates the user selection into a query that #VTGrep understands.
#Link:-
https://blog.virustotal.com/2020/02/official-virustotal-plugin-for-ida-pro-7.html?m=1
This plugin adds a new "VirusTotal" entry to the IDA Pro context menu (#disassembly and strings #windows), enabling you to search for similar or exact #data on VirusTotal. It translates the user selection into a query that #VTGrep understands.
#Link:-
https://blog.virustotal.com/2020/02/official-virustotal-plugin-for-ida-pro-7.html?m=1
#VirusTotal is very excited to announce a #beta release of a new #plugin for #IDA Pro v7 which integrates VT Intelligence’s content search directly into IDA.
This plugin adds a new "VirusTotal" entry to the IDA Pro context menu (#disassembly and strings #windows), enabling you to search for similar or exact #data on VirusTotal. It translates the user selection into a query that #VTGrep understands.
#Link:-
https://blog.virustotal.com/2020/02/official-virustotal-plugin-for-ida-pro-7.html?m=1
#Django-DefectDojo:--
#DefectDojo is an #open-source #application #vulnerability correlation and #security #orchestration #tool.
DefectDojo is a security program and vulnerability #management tool. DefectDojo allows you to manage your application #security #program, maintain product and application #information, schedule #scans, triage #vulnerabilities and push findings into #defect trackers. Consolidate your findings into one source of truth with #DefectDojo.
#Download #Link:-
https://github.com/DefectDojo/django-DefectDojo
#Django-DefectDojo:--
#DefectDojo is an #open-source #application #vulnerability correlation and #security #orchestration #tool.
DefectDojo is a security program and vulnerability #management tool. DefectDojo allows you to manage your application #security #program, maintain product and application #information, schedule #scans, triage #vulnerabilities and push findings into #defect trackers. Consolidate your findings into one source of truth with #DefectDojo.
#Download #Link:-
https://github.com/DefectDojo/django-DefectDojo
#DefectDojo is an #open-source #application #vulnerability correlation and #security #orchestration #tool.
DefectDojo is a security program and vulnerability #management tool. DefectDojo allows you to manage your application #security #program, maintain product and application #information, schedule #scans, triage #vulnerabilities and push findings into #defect trackers. Consolidate your findings into one source of truth with #DefectDojo.
#Download #Link:-
https://github.com/DefectDojo/django-DefectDojo
#Django-DefectDojo:--
#DefectDojo is an #open-source #application #vulnerability correlation and #security #orchestration #tool.
DefectDojo is a security program and vulnerability #management tool. DefectDojo allows you to manage your application #security #program, maintain product and application #information, schedule #scans, triage #vulnerabilities and push findings into #defect trackers. Consolidate your findings into one source of truth with #DefectDojo.
#Download #Link:-
https://github.com/DefectDojo/django-DefectDojo
#mr-lunix
from requests import get
yourip = get('https://api.ipify.org').text
print('Your public IP address is: {}'.format(yourip))
اسكربت بايثون بسيط لمعرفه الايبي الخارجي الخاص بك
يمكنك استخدامه للتاكد من ان الايبي الخاص بك قد تغير حتي لا تقع في المشاكل
from requests import get
yourip = get('https://api.ipify.org').text
print('Your public IP address is: {}'.format(yourip))
اسكربت بايثون بسيط لمعرفه الايبي الخارجي الخاص بك
يمكنك استخدامه للتاكد من ان الايبي الخاص بك قد تغير حتي لا تقع في المشاكل
Photos from National Cyber Security Services's post
BlackWidow:-- A #Python-based #web #application #scanner to gather #OSINT and fuzz for #OWASP #vulnerabilities on a target website.
#BlackWidow is a python based web application spider to gather #subdomains, #URL's, #dynamic #parameters, #email addresses and #phone numbers from a #target #website. This project also includes Inject-X fuzzer to scan dynamic URL's for common OWASP vulnerabilities.
#FEATURES:-
1. Automatically collect all URL's from a target website
2. Automatically collect all dynamic URL's and parameters from a target website
3. Automatically collect all subdomains from a target website
4. Automatically collect all phone numbers from a target website
5. Automatically collect all email addresses from a target website
6. Automatically collect all form URL's from a target website
7. Automatically scan/fuzz for common OWASP TOP vulnerabilities
8. Automatically saves all data into sorted text files
#Download #Link:-
https://github.com/1N3/BlackWidow
BlackWidow:-- A #Python-based #web #application #scanner to gather #OSINT and fuzz for #OWASP #vulnerabilities on a target website.
#BlackWidow is a python based web application spider to gather #subdomains, #URL's, #dynamic #parameters, #email addresses and #phone numbers from a #target #website. This project also includes Inject-X fuzzer to scan dynamic URL's for common OWASP vulnerabilities.
#FEATURES:-
1. Automatically collect all URL's from a target website
2. Automatically collect all dynamic URL's and parameters from a target website
3. Automatically collect all subdomains from a target website
4. Automatically collect all phone numbers from a target website
5. Automatically collect all email addresses from a target website
6. Automatically collect all form URL's from a target website
7. Automatically scan/fuzz for common OWASP TOP vulnerabilities
8. Automatically saves all data into sorted text files
#Download #Link:-
https://github.com/1N3/BlackWidow
Photos from National Cyber Security Services's post
DroneSploit:-- #Drone #Pentesting #Framework console.
This #CLI framework is based on #sploitkit and is an attempt to gather hacking techniques and #exploits especially focused on drone #hacking. For ease of use, the interface has a layout that looks like #Metasploit.
#Download #Link:-
https://github.com/dhondta/dronesploit
DroneSploit:-- #Drone #Pentesting #Framework console.
This #CLI framework is based on #sploitkit and is an attempt to gather hacking techniques and #exploits especially focused on drone #hacking. For ease of use, the interface has a layout that looks like #Metasploit.
#Download #Link:-
https://github.com/dhondta/dronesploit