The Hacking Library
350 subscribers
874 photos
19 videos
44 files
1.3K links
محتوي القناه هو عباره عن تجميع
القناه عباره عن ارشيف للهكرز الأخلاقيات وغير الأخلاقيين
استمتعوا😀👍
Download Telegram
Photos from National Cyber Security Services's post


K6:-- A #modern #load #testing tool, using #Go and #JavaScript.

#k6 is a modern load testing tool, building on Load Impact's years of experience in the load and performance testing industry. It provides a clean, approachable scripting API, local and cloud execution, flexible configuration, with command & control through #CLI or a #REST #API.

Features:-
1. #Scripting in ES6 #JS: support for modules to aid code reusability across an #organization
2. Everything as code: test logic and configuration options are both in JS for version control friendliness
3. Automation-friendly: checks (like asserts) and thresholds for easy and flexible CI configuration!
4. HTTP/1.1, HTTP/2 and WebSocket protocol support
5. TLS features: client certificates, configurable SSL/TLS versions, and ciphers
6. Batteries included: #Cookies, #Crypto, Custom metrics, #Encodings, #Environment variables, #JSON, #HTML forms, files, flexible execution control, and more.
7. Built-in HAR converter: record browser sessions as .har files and directly convert them to k6 scripts
8. Flexible metrics storage and #visualization: InfluxDB (+Grafana), JSON or Load Impact Insights
9. #Cloud #execution and distributed tests (currently only on infrastructure managed by Load Impact, with native distributed execution in k6 planned for the near future!)

#Download #Link:-

https://github.com/loadimpact/k6
IDACyber- Data Visualization Plugin for IDA Pro


IDACyber:-- #Data #Visualization #Plugin for #IDA #Pro.

#IDACyber is an interactive data visualization plugin for IDA Pro. It consists of external "color filters" that transform raw data bytes into a canvas that can be used to inspect and navigate data interactively. Depending on the filter in context, browsing this data visually can reveal particular structures and patterns, literally from a zoomed-out perspective.

Requirements
1. IDA 7.3+
2. This #IDAPython project is compatible with #Python3 only. For compatibility with older versions of IDA, you may want to check out the Python2 branch of this project. The Python2 branch is no longer maintained and thus contains outdated code.

#Download #Link:-

https://github.com/patois/IDACyber





(Feed generated with FetchRSS (http://fetchrss.com/))
Photos from National Cyber Security Services's post


Malcolm:-- #Malcolm is a #powerful, easily #deployable #network #traffic #analysis #tool suite for full #packet #capture artifacts (#PCAP files) and #Zeek logs.

Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind:-

1. Easy to use:– Malcolm accepts network traffic #data in the form of full packet capture (PCAP) files and Zeek (formerly Bro) logs. These artifacts can be uploaded via a simple browser-based interface or captured live and forwarded to Malcolm using lightweight forwarders. In either case, the data is #automatically normalized, #enriched, and correlated for analysis.

2. Powerful traffic analysis:– Visibility into network communications is provided through two intuitive interfaces: #Kibana, a flexible data #visualization plugin with dozens of prebuilt #dashboards providing an at-a-glance overview of network protocols; and Moloch, a powerful tool for finding and identifying the network #sessions #comprising suspected security incidents.

3. Streamlined deployment:– Malcolm operates as a cluster of #Docker containers, isolated #sandboxes which each serves a dedicated function of the #system. This Docker-based deployment model, combined with a few simple scripts for setup and run-time management, makes Malcolm suitable to be deployed quickly across a variety of platforms and use cases, whether it be for long-term deployment on a #Linux #server in a #security operations center (SOC) or for incident response on a #Macbook for an individual engagement.

4. Secure #communications:– All #communications with Malcolm, both from the user interface and from #remote log forwarders, are secured with industry-standard #encryption #protocols.

5. Permissive license:– Malcolm is comprised of several widely used open-source tools, making it an attractive alternative to security solutions requiring paid #licenses.

6. Expanding control systems visibility:– While Malcolm is great for general-purpose network traffic analysis, its creators see a particular need in the #community for tools providing insight into protocols used in industrial control systems (ICS) environments. Ongoing Malcolm development will aim to provide additional parsers for common #ICS protocols.

#Download #Link:-

https://github.com/idaholab/Malcolm