Photos from National Cyber Security Services's post
Ghost Framework:-- #Android #post #exploitation #framework that uses an Android Debug Bridge to #remotely access an Android device. #Ghost Framework gives you the power and convenience of #remote Android #device #administration.
Why ghost framework?
1. Accessing device shell
INFO: Ghost Framework can be used to access the remote
Android device #shell without using #OpenSSH or other protocols.
2. Emulating device button presses
INFO: Ghost Framework can be used to emulate
button presses on the remote Android device.
3. Removing device password
INFO: Ghost Framework can be used to remove the
remote Android device #password if it was forgotten.
#Downlaod #Link:-
https://github.com/entynetproject/ghost
Ghost Framework:-- #Android #post #exploitation #framework that uses an Android Debug Bridge to #remotely access an Android device. #Ghost Framework gives you the power and convenience of #remote Android #device #administration.
Why ghost framework?
1. Accessing device shell
INFO: Ghost Framework can be used to access the remote
Android device #shell without using #OpenSSH or other protocols.
2. Emulating device button presses
INFO: Ghost Framework can be used to emulate
button presses on the remote Android device.
3. Removing device password
INFO: Ghost Framework can be used to remove the
remote Android device #password if it was forgotten.
#Downlaod #Link:-
https://github.com/entynetproject/ghost
#VirusTotal is very excited to announce a #beta release of a new #plugin for #IDA Pro v7 which integrates VT Intelligence’s content search directly into IDA.
This plugin adds a new "VirusTotal" entry to the IDA Pro context menu (#disassembly and strings #windows), enabling you to search for similar or exact #data on VirusTotal. It translates the user selection into a query that #VTGrep understands.
#Link:-
https://blog.virustotal.com/2020/02/official-virustotal-plugin-for-ida-pro-7.html?m=1
#VirusTotal is very excited to announce a #beta release of a new #plugin for #IDA Pro v7 which integrates VT Intelligence’s content search directly into IDA.
This plugin adds a new "VirusTotal" entry to the IDA Pro context menu (#disassembly and strings #windows), enabling you to search for similar or exact #data on VirusTotal. It translates the user selection into a query that #VTGrep understands.
#Link:-
https://blog.virustotal.com/2020/02/official-virustotal-plugin-for-ida-pro-7.html?m=1
This plugin adds a new "VirusTotal" entry to the IDA Pro context menu (#disassembly and strings #windows), enabling you to search for similar or exact #data on VirusTotal. It translates the user selection into a query that #VTGrep understands.
#Link:-
https://blog.virustotal.com/2020/02/official-virustotal-plugin-for-ida-pro-7.html?m=1
#VirusTotal is very excited to announce a #beta release of a new #plugin for #IDA Pro v7 which integrates VT Intelligence’s content search directly into IDA.
This plugin adds a new "VirusTotal" entry to the IDA Pro context menu (#disassembly and strings #windows), enabling you to search for similar or exact #data on VirusTotal. It translates the user selection into a query that #VTGrep understands.
#Link:-
https://blog.virustotal.com/2020/02/official-virustotal-plugin-for-ida-pro-7.html?m=1
#Django-DefectDojo:--
#DefectDojo is an #open-source #application #vulnerability correlation and #security #orchestration #tool.
DefectDojo is a security program and vulnerability #management tool. DefectDojo allows you to manage your application #security #program, maintain product and application #information, schedule #scans, triage #vulnerabilities and push findings into #defect trackers. Consolidate your findings into one source of truth with #DefectDojo.
#Download #Link:-
https://github.com/DefectDojo/django-DefectDojo
#Django-DefectDojo:--
#DefectDojo is an #open-source #application #vulnerability correlation and #security #orchestration #tool.
DefectDojo is a security program and vulnerability #management tool. DefectDojo allows you to manage your application #security #program, maintain product and application #information, schedule #scans, triage #vulnerabilities and push findings into #defect trackers. Consolidate your findings into one source of truth with #DefectDojo.
#Download #Link:-
https://github.com/DefectDojo/django-DefectDojo
#DefectDojo is an #open-source #application #vulnerability correlation and #security #orchestration #tool.
DefectDojo is a security program and vulnerability #management tool. DefectDojo allows you to manage your application #security #program, maintain product and application #information, schedule #scans, triage #vulnerabilities and push findings into #defect trackers. Consolidate your findings into one source of truth with #DefectDojo.
#Download #Link:-
https://github.com/DefectDojo/django-DefectDojo
#Django-DefectDojo:--
#DefectDojo is an #open-source #application #vulnerability correlation and #security #orchestration #tool.
DefectDojo is a security program and vulnerability #management tool. DefectDojo allows you to manage your application #security #program, maintain product and application #information, schedule #scans, triage #vulnerabilities and push findings into #defect trackers. Consolidate your findings into one source of truth with #DefectDojo.
#Download #Link:-
https://github.com/DefectDojo/django-DefectDojo
#mr-lunix
from requests import get
yourip = get('https://api.ipify.org').text
print('Your public IP address is: {}'.format(yourip))
اسكربت بايثون بسيط لمعرفه الايبي الخارجي الخاص بك
يمكنك استخدامه للتاكد من ان الايبي الخاص بك قد تغير حتي لا تقع في المشاكل
from requests import get
yourip = get('https://api.ipify.org').text
print('Your public IP address is: {}'.format(yourip))
اسكربت بايثون بسيط لمعرفه الايبي الخارجي الخاص بك
يمكنك استخدامه للتاكد من ان الايبي الخاص بك قد تغير حتي لا تقع في المشاكل
Photos from National Cyber Security Services's post
BlackWidow:-- A #Python-based #web #application #scanner to gather #OSINT and fuzz for #OWASP #vulnerabilities on a target website.
#BlackWidow is a python based web application spider to gather #subdomains, #URL's, #dynamic #parameters, #email addresses and #phone numbers from a #target #website. This project also includes Inject-X fuzzer to scan dynamic URL's for common OWASP vulnerabilities.
#FEATURES:-
1. Automatically collect all URL's from a target website
2. Automatically collect all dynamic URL's and parameters from a target website
3. Automatically collect all subdomains from a target website
4. Automatically collect all phone numbers from a target website
5. Automatically collect all email addresses from a target website
6. Automatically collect all form URL's from a target website
7. Automatically scan/fuzz for common OWASP TOP vulnerabilities
8. Automatically saves all data into sorted text files
#Download #Link:-
https://github.com/1N3/BlackWidow
BlackWidow:-- A #Python-based #web #application #scanner to gather #OSINT and fuzz for #OWASP #vulnerabilities on a target website.
#BlackWidow is a python based web application spider to gather #subdomains, #URL's, #dynamic #parameters, #email addresses and #phone numbers from a #target #website. This project also includes Inject-X fuzzer to scan dynamic URL's for common OWASP vulnerabilities.
#FEATURES:-
1. Automatically collect all URL's from a target website
2. Automatically collect all dynamic URL's and parameters from a target website
3. Automatically collect all subdomains from a target website
4. Automatically collect all phone numbers from a target website
5. Automatically collect all email addresses from a target website
6. Automatically collect all form URL's from a target website
7. Automatically scan/fuzz for common OWASP TOP vulnerabilities
8. Automatically saves all data into sorted text files
#Download #Link:-
https://github.com/1N3/BlackWidow
Photos from National Cyber Security Services's post
DroneSploit:-- #Drone #Pentesting #Framework console.
This #CLI framework is based on #sploitkit and is an attempt to gather hacking techniques and #exploits especially focused on drone #hacking. For ease of use, the interface has a layout that looks like #Metasploit.
#Download #Link:-
https://github.com/dhondta/dronesploit
DroneSploit:-- #Drone #Pentesting #Framework console.
This #CLI framework is based on #sploitkit and is an attempt to gather hacking techniques and #exploits especially focused on drone #hacking. For ease of use, the interface has a layout that looks like #Metasploit.
#Download #Link:-
https://github.com/dhondta/dronesploit
Photos from National Cyber Security Services's post
Bettercap:-- The #Swiss #Army #knife for 802.11, BLE and Ethernet network #reconnaissance and #MITM attacks.
#Bettercap is a #powerful, easily extensible and portable #framework written in #Go which aims to offer to #security #researchers, #redteamers and #reverse #engineers an easy to use, all-in-one solution with all the features they might possibly need for performing reconnaissance and attacking #WiFi networks, #Bluetooth Low Energy devices, #wireless #HID devices, and Ethernet networks.
Main Features:-
1. WiFi networks scanning, de-authentication attack, clientless #PMKID association attack, and automatic #WPA/ #WPA2 client handshakes capture.
2. Bluetooth Low Energy devices scanning, characteristics enumeration, reading, and writing.
3. 2.4Ghz wireless devices scanning and #MouseJacking attacks with over-the-air HID frames injection (with #DuckyScript support).
4. Passive and active IP network hosts probing and recon.
5. #ARP, #DNS and #DHCPv6 spoofers for MITM attacks on IP based networks.
6. Proxies at the packet level, #TCP level and #HTTP/ #HTTPS application-level fully scriptable with easy to implement javascript plugins.
7. A powerful network sniffer for credentials harvesting which can also be used as a network #protocol #fuzzer.
8. A very fast port scanner.
9. A powerful #REST #API with support for asynchronous events notification on #WebSocket to orchestrate your attacks easily.
10. A very convenient #web UI.
More!
#Download #Link:-
https://github.com/bettercap/bettercap
Bettercap:-- The #Swiss #Army #knife for 802.11, BLE and Ethernet network #reconnaissance and #MITM attacks.
#Bettercap is a #powerful, easily extensible and portable #framework written in #Go which aims to offer to #security #researchers, #redteamers and #reverse #engineers an easy to use, all-in-one solution with all the features they might possibly need for performing reconnaissance and attacking #WiFi networks, #Bluetooth Low Energy devices, #wireless #HID devices, and Ethernet networks.
Main Features:-
1. WiFi networks scanning, de-authentication attack, clientless #PMKID association attack, and automatic #WPA/ #WPA2 client handshakes capture.
2. Bluetooth Low Energy devices scanning, characteristics enumeration, reading, and writing.
3. 2.4Ghz wireless devices scanning and #MouseJacking attacks with over-the-air HID frames injection (with #DuckyScript support).
4. Passive and active IP network hosts probing and recon.
5. #ARP, #DNS and #DHCPv6 spoofers for MITM attacks on IP based networks.
6. Proxies at the packet level, #TCP level and #HTTP/ #HTTPS application-level fully scriptable with easy to implement javascript plugins.
7. A powerful network sniffer for credentials harvesting which can also be used as a network #protocol #fuzzer.
8. A very fast port scanner.
9. A powerful #REST #API with support for asynchronous events notification on #WebSocket to orchestrate your attacks easily.
10. A very convenient #web UI.
More!
#Download #Link:-
https://github.com/bettercap/bettercap