Exutils:-- #Command line #extension #utilities.
A collection of #commands to make the troublesome one-liner a little easier.
About the concept:-
1. Commands that were not likely.
2. A command is written in a #Bash script.
3. Specializing in command-line operation.
4. Complex processing can be expressed with just a few characters.
#Downlaod #Link:-
https://github.com/redpeacock78/exutils
Exutils:-- #Command line #extension #utilities.
A collection of #commands to make the troublesome one-liner a little easier.
About the concept:-
1. Commands that were not likely.
2. A command is written in a #Bash script.
3. Specializing in command-line operation.
4. Complex processing can be expressed with just a few characters.
#Downlaod #Link:-
https://github.com/redpeacock78/exutils
A collection of #commands to make the troublesome one-liner a little easier.
About the concept:-
1. Commands that were not likely.
2. A command is written in a #Bash script.
3. Specializing in command-line operation.
4. Complex processing can be expressed with just a few characters.
#Downlaod #Link:-
https://github.com/redpeacock78/exutils
Exutils:-- #Command line #extension #utilities.
A collection of #commands to make the troublesome one-liner a little easier.
About the concept:-
1. Commands that were not likely.
2. A command is written in a #Bash script.
3. Specializing in command-line operation.
4. Complex processing can be expressed with just a few characters.
#Downlaod #Link:-
https://github.com/redpeacock78/exutils
4K-Botnet:-- A #simple and #easy to use #JS #Botnet.
How to #Setup:-
1. Clone repository
2. Upload the "Botnet" folder to your #webserver
3. Edit "bot.js"
Change the "SERVER_URL" variable to your #website's #URL
Change the "api_dev_key" variable to match your Pastebin's account key
Change the "api_user_key" variable to match your Pastebin's account key
4. Done
How to use it?
1. Edit the "cmds.txt" file - Each #command on a separate line
2. Inject "bot.js" into the victim's #webpage
#Download #Link:-
https://github.com/4k-developer/4K-Botnet
4K-Botnet:-- A #simple and #easy to use #JS #Botnet.
How to #Setup:-
1. Clone repository
2. Upload the "Botnet" folder to your #webserver
3. Edit "bot.js"
Change the "SERVER_URL" variable to your #website's #URL
Change the "api_dev_key" variable to match your Pastebin's account key
Change the "api_user_key" variable to match your Pastebin's account key
4. Done
How to use it?
1. Edit the "cmds.txt" file - Each #command on a separate line
2. Inject "bot.js" into the victim's #webpage
#Download #Link:-
https://github.com/4k-developer/4K-Botnet
How to #Setup:-
1. Clone repository
2. Upload the "Botnet" folder to your #webserver
3. Edit "bot.js"
Change the "SERVER_URL" variable to your #website's #URL
Change the "api_dev_key" variable to match your Pastebin's account key
Change the "api_user_key" variable to match your Pastebin's account key
4. Done
How to use it?
1. Edit the "cmds.txt" file - Each #command on a separate line
2. Inject "bot.js" into the victim's #webpage
#Download #Link:-
https://github.com/4k-developer/4K-Botnet
4K-Botnet:-- A #simple and #easy to use #JS #Botnet.
How to #Setup:-
1. Clone repository
2. Upload the "Botnet" folder to your #webserver
3. Edit "bot.js"
Change the "SERVER_URL" variable to your #website's #URL
Change the "api_dev_key" variable to match your Pastebin's account key
Change the "api_user_key" variable to match your Pastebin's account key
4. Done
How to use it?
1. Edit the "cmds.txt" file - Each #command on a separate line
2. Inject "bot.js" into the victim's #webpage
#Download #Link:-
https://github.com/4k-developer/4K-Botnet
CSWSH:-- A #command-line tool for Cross-Site #WebSocket #Hijacking.
A command-line tool designed to test and connect to a WebSocket which are #vulnerable to Cross-Site WebSocket Hijacking vulnerability.
#CSWSH tool can connect to both standard and socket.io based WebSockets.
1. A standard WebSocket will have the functionality of sending messages to the server and receiving messages from the server.
2. A socket.io based WebSocket will have only the ping functionality to check if the connection is successful or not.
#Download #Link:-
https://github.com/DeepakPawar95/cswsh
CSWSH:-- A #command-line tool for Cross-Site #WebSocket #Hijacking.
A command-line tool designed to test and connect to a WebSocket which are #vulnerable to Cross-Site WebSocket Hijacking vulnerability.
#CSWSH tool can connect to both standard and socket.io based WebSockets.
1. A standard WebSocket will have the functionality of sending messages to the server and receiving messages from the server.
2. A socket.io based WebSocket will have only the ping functionality to check if the connection is successful or not.
#Download #Link:-
https://github.com/DeepakPawar95/cswsh
A command-line tool designed to test and connect to a WebSocket which are #vulnerable to Cross-Site WebSocket Hijacking vulnerability.
#CSWSH tool can connect to both standard and socket.io based WebSockets.
1. A standard WebSocket will have the functionality of sending messages to the server and receiving messages from the server.
2. A socket.io based WebSocket will have only the ping functionality to check if the connection is successful or not.
#Download #Link:-
https://github.com/DeepakPawar95/cswsh
CSWSH:-- A #command-line tool for Cross-Site #WebSocket #Hijacking.
A command-line tool designed to test and connect to a WebSocket which are #vulnerable to Cross-Site WebSocket Hijacking vulnerability.
#CSWSH tool can connect to both standard and socket.io based WebSockets.
1. A standard WebSocket will have the functionality of sending messages to the server and receiving messages from the server.
2. A socket.io based WebSocket will have only the ping functionality to check if the connection is successful or not.
#Download #Link:-
https://github.com/DeepakPawar95/cswsh
Photos from National Cyber Security Services's post
Android Application Analyzer:-- The #tool is used to #analyze the content of the #android #application in local storage.
Install the dependency using following #command:-
1. chmod +x setup.sh
2. ./setup.sh
Use the following command to run the tool:
1. python3 main.py
In order to run "Fridump" and "Frida #universal #ssl unpinning" script, #Frida client must be installed on base machine
#Download #Link:-
https://github.com/NotSoSecure/android_application_analyzer
Android Application Analyzer:-- The #tool is used to #analyze the content of the #android #application in local storage.
Install the dependency using following #command:-
1. chmod +x setup.sh
2. ./setup.sh
Use the following command to run the tool:
1. python3 main.py
In order to run "Fridump" and "Frida #universal #ssl unpinning" script, #Frida client must be installed on base machine
#Download #Link:-
https://github.com/NotSoSecure/android_application_analyzer