The Hacking Library
350 subscribers
874 photos
19 videos
44 files
1.3K links
محتوي القناه هو عباره عن تجميع
القناه عباره عن ارشيف للهكرز الأخلاقيات وغير الأخلاقيين
استمتعوا😀👍
Download Telegram
Saker:-- #Flexible #Penetrate #Testing #Auxiliary #Suite.

brief support features:-

1. scan website
#information #gathering
#framework #fingerprint
2. #fuzz #web request
#XSS
#SQL #injection
SSRF
XXE
3. #subdomain gathering
4. #port scanner
5. bruteforce
web dir
zip password
domain
6. auxiliary servers
#DNS rebinding
SSRF
XSS
7. third party API integration
crtsh
DNS dumper
#github
#sqlmap

#Download #Link:-

https://github.com/LyleMi/Saker


Saker:-- #Flexible #Penetrate #Testing #Auxiliary #Suite.

brief support features:-

1. scan website
#information #gathering
#framework #fingerprint
2. #fuzz #web request
#XSS
#SQL #injection
SSRF
XXE
3. #subdomain gathering
4. #port scanner
5. bruteforce
web dir
zip password
domain
6. auxiliary servers
#DNS rebinding
SSRF
XSS
7. third party API integration
crtsh
DNS dumper
#github
#sqlmap

#Download #Link:-

https://github.com/LyleMi/Saker
Photos from National Cyber Security Services's post


Memhunter:-- Live #Hunting Of #Code #Injection #Techniques.

Memhunter is an endpoint sensor tool that is specialized in detecing resident #malware, improving the threat hunter analysis process and remediation times. The tool detects and reports memory-resident malware living on endpoint processes. Memhunter detects known #malicious #memory injection techniques. The detection #process is performed through live analysis and without needing memory dumps. The tool was designed as a replacement for memory #forensic #volatility #plugins such as malfind and hollowfind. The idea of not requiring memory dumps helps on performing the memory-resident malware threat hunting at scale, without manual #analysis, and without the complex #infrastructure needed to move dumps to forensic environments.

#Download #Link:-

https://github.com/marcosd4h/memhunter
Photos from National Cyber Security Services's post


Maltrail:-- #Malicious #traffic #detection #system.

Maltrail is a #malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user-defined lists, where trail can be anything from #domain name (e.g. zvpprsensinaix.com for #Banjori malware), URL (e.g. hXXp://109.162.38.120/harsh02.exe for known malicious executable), IP address (e.g. 185.130.5.231 for known attacker) or #HTTP User-Agent header value (e.g. #sqlmap for automatic #SQL #injection and #database takeover tool). Also, it uses (optional) advanced heuristic #mechanisms that can help in the discovery of unknown threats (e.g. new #malware).

#Downlaod #Link:-

https://github.com/stamparm/maltrail
Pupy:-- #Pupy is an #opensource, #cross-platform (#Windows, #Linux, #OSX, #Android) #remote #administration and #post-#exploitation tool mainly written in #python.

Pupy is a cross-platform, multi-function #RAT and post-exploitation tool mainly written in python. It features an all-in-memory execution guideline and leaves a very low footprint. Pupy can communicate using multiple modes of #transport, migrate into #processes using reflective #injection, and load remote python code, python packages and python C-extensions from #memory.

Features:-

1. Windows #payload can load the entire Python #interpreter from memory using a reflective #DLL.
2. Can be packed into a single .py file and run without any dependencies other than the python standard library on all OSes.
3. Reflectively migrate into other processes.
4. Easily extensible, modules are simple to write and are sorted by os and category.
5. Modules can directly access python objects on the remote client using rpyc.
6. Access remote objects interactively from the pupy shell and get auto-completion of remote attributes.
7. Communication transports are modular and stackable. Exfiltrate data using #HTTP over HTTP over #AES over #XOR, or any combination of the available transports.
8. Communicate using obfsproxy pluggable transports.
9. Execute non-interactive commands on multiple hosts at once.
10. Commands and scripts running on remote hosts are interruptible.
11. Auto-completion for #commands and arguments.
12. Custom config can be defined: command aliases, modules. automatically run at connection, etc.
13. Open interactive python shells with auto-completion on the all-in-memory remote python interpreter.
14. Interactive shells (cmd.exe, /bin/bash, etc) can be opened remotely.
15. Remotely import pure python packages (.py, .pyc) and compiled python C extensions (.pyd, .so) from memory.
16. Execute the PE executable remotely and from memory.
17. Generate payloads in various formats:

#Download #Link:--

https://github.com/n1nj4sec/pupy


Pupy:-- #Pupy is an #opensource, #cross-platform (#Windows, #Linux, #OSX, #Android) #remote #administration and #post-#exploitation tool mainly written in #python.

Pupy is a cross-platform, multi-function #RAT and post-exploitation tool mainly written in python. It features an all-in-memory execution guideline and leaves a very low footprint. Pupy can communicate using multiple modes of #transport, migrate into #processes using reflective #injection, and load remote python code, python packages and python C-extensions from #memory.

Features:-

1. Windows #payload can load the entire Python #interpreter from memory using a reflective #DLL.
2. Can be packed into a single .py file and run without any dependencies other than the python standard library on all OSes.
3. Reflectively migrate into other processes.
4. Easily extensible, modules are simple to write and are sorted by os and category.
5. Modules can directly access python objects on the remote client using rpyc.
6. Access remote objects interactively from the pupy shell and get auto-completion of remote attributes.
7. Communication transports are modular and stackable. Exfiltrate data using #HTTP over HTTP over #AES over #XOR, or any combination of the available transports.
8. Communicate using obfsproxy pluggable transports.
9. Execute non-interactive commands on multiple hosts at once.
10. Commands and scripts running on remote hosts are interruptible.
11. Auto-completion for #commands and arguments.
12. Custom config can be defined: command aliases, modules. automatically run at connection, etc.
13. Open interactive python shells with auto-completion on the all-in-memory remote python interpreter.
14. Interactive shells (cmd.exe, /bin/bash, etc) can be opened remotely.
15. Remotely import pure python packages (.py, .pyc) and compiled python C extensions (.pyd, .so) from memory.
16. Execute the PE executable remotely and from memory.
17. Generate payloads in various formats: