🔴🔴How to Hack Instagram 👌👌
🔰"ᴄʀᴀᴄᴋɪɴɢ ᴜsɪɴɢ ʙʀᴜᴛᴇ ғᴏʀᴄᴇ (ᴏʀ ᴅɪᴄᴛɪᴏɴᴀʀʏ ᴀᴛᴛᴀᴄᴋ) ᴛᴀᴋᴇs ᴀ ʟᴏɴɢ ᴛɪᴍᴇ ᴀɴᴅ ᴏɴʟʏ ᴡᴏʀᴋs ᴡɪᴛʜ sɪᴍᴘʟᴇ ᴘᴀssᴡᴏʀᴅs. ɪᴛ ɪs ᴍᴜᴄʜ ʙᴇᴛᴛᴇʀ ᴛᴏ ᴄᴀʀʀʏ ᴏᴜᴛ ᴏᴛʜᴇʀ ᴍᴇᴛʜᴏᴅs sᴜᴄʜ ᴀs ᴘʜɪsɪɴɢ ʙᴇғᴏʀᴇ sᴜᴄᴄᴜᴍʙɪɴɢ ᴛᴏ ʙʀᴜᴛᴇ ғᴏʀᴄᴇ."
✅ ᴡʜᴀᴛ ʏᴏᴜ ᴡɪʟʟ ɴᴇᴇᴅ
♻️- ᴀɴ ᴏʙᴊᴇᴄᴛɪᴠᴇ ᴀᴄᴄᴏᴜɴᴛ ᴛᴏ ᴀᴛᴛᴀᴄᴋ
♻️- ᴀ ᴄᴏᴍᴘᴜᴛᴇʀ ᴡɪᴛʜ ᴛʜᴇ "ᴋᴀʟɪ ʟɪɴᴜx" ᴏᴘᴇʀᴀᴛɪɴɢ sʏsᴛᴇᴍ (ᴏʀ ᴀɴʏ ᴏᴛʜᴇʀ ᴅᴇʙɪᴀɴ ᴅɪsᴛʀɪʙᴜᴛɪᴏɴ).
🚸- ᴅᴇᴄᴇɴᴛ ɪɴᴛᴇʀɴᴇᴛ ᴄᴏɴɴᴇᴄᴛɪᴏɴ
♻️ɪғ ʏᴏᴜ ᴅᴇᴄɪᴅᴇ ᴛᴏ ᴜɴʙʟᴏᴄᴋ ᴛʜᴇ ᴄᴏɴᴛᴇɴᴛ ʏᴏᴜ ᴜɴᴅᴇʀsᴛᴀɴᴅ ᴘᴇʀғᴇᴄᴛʟʏ ᴛʜᴀᴛ ɪ ᴅᴏ ɴᴏᴛ ᴛᴀᴋᴇ ᴄʜᴀʀɢᴇ ᴏғ ᴛʜᴇ ᴜsᴇ ʏᴏᴜ ɢɪᴠᴇ ᴛᴏ ᴛʜᴇ ᴄᴏɴᴛᴇɴᴛ ᴏғ ᴛʜɪs ᴘᴏsᴛ ᴀɴᴅ ɪ ᴡɪʟʟ ɴᴏᴛ ʙᴇ ʀᴇsᴘᴏɴsɪʙʟᴇ ғᴏʀ ʏᴏᴜʀ ᴀᴄᴛɪᴏɴs ᴏɴᴄᴇ ʏᴏᴜ ʜᴀᴠᴇ ᴜɴʟᴏᴄᴋᴇᴅ ᴛʜᴇ ᴄᴏɴᴛᴇɴᴛ. ᴛʜᴀɴᴋs ^^
🔰1- sᴛᴀʀᴛ "ᴋᴀʟɪ ʟɪɴᴜx" ᴀɴᴅ ɢᴏ ᴛᴏ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ. ᴛʜᴇɴ, ᴛʏᴘᴇ ᴛʜᴇ ɴᴇxᴛ:
> sᴜᴅᴏ sᴜ
ᴀɴᴅ ᴘᴜᴛ ᴛʜᴇ ᴀᴅᴍɪɴ ᴘᴀssᴡᴏʀᴅ ᴛᴏ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ ɪɴ ʀᴏᴏᴛ ᴍᴏᴅᴇ.
🔰2- ɴᴏᴡ ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ᴄʟᴏɴᴇ ᴛʜᴇ ᴛᴏᴏʟs ᴛʜᴀᴛ ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ᴜsᴇ. ᴛʏᴘᴇ:
> ᴄᴅ [ᴛʜᴇ ᴘᴀᴛʜ ᴡʜᴇʀᴇ ʏᴏᴜ ᴡᴀɴᴛ ᴛᴏ ᴅᴏ ᴛʜᴀᴛ]
> ɢɪᴛ ᴄʟᴏɴᴇ ʜᴛᴛᴘs: //ɢɪᴛʜᴜʙ. ᴄᴏᴍ/ᴇᴛʜɪᴄᴀʟ-ʜ4ᴄᴋ3ʀ/ɪɴsᴛᴀɢʀᴀᴍ (ᴅᴇʟᴇᴛᴇ ᴛʜᴇ sᴘᴀᴄᴇs)
> ᴄᴅ ɪɴsᴛᴀɢʀᴀᴍ
🔰3- ᴅᴏ ᴀ ʟs. ʏᴏᴜ ᴡɪʟʟ sᴇᴇ 3 ғɪʟᴇs/ᴅɪʀᴇᴄᴛᴏʀɪᴇs: "ᴄᴏʀᴇ", "ɪɴsᴛᴀɢʀᴀᴍ.ᴘʏ" ᴀɴᴅ ᴀɴᴏᴛʜᴇʀ ғɪʟᴇ. ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ɢɪᴠᴇ ᴘᴇʀᴍɪssɪᴏɴs ᴛᴏ ᴛʜᴇ ᴛᴏᴏʟ. ᴛʏᴘᴇ ɪɴ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ:
> ᴄʜᴍᴏᴅ +x ɪɴsᴛᴀɢʀᴀᴍ.ᴘʏ
🔰4- ɴᴏᴡ ᴡᴇ ɴᴇᴇᴅ ᴛᴏ ᴄʀᴇᴀᴛᴇ ᴀ ᴡᴏʀᴅʟɪsᴛ ғᴏʀ ᴘᴀssᴡᴏʀᴅs. ɪ ᴡɪʟʟ ɴᴏᴛ ᴇxᴘʟᴀɪɴ ʜᴏᴡ ᴛᴏ ᴅᴏ ᴛʜɪs ʙᴇᴄᴀᴜsᴇ ɪᴛ ɪs ᴄᴏᴍᴍᴏɴ sᴇɴsᴇ, ʙᴜᴛ ɪғ ʏᴏᴜ ʜᴀᴠᴇ ɴᴏ ɪᴅᴇᴀ ᴡʜᴇʀᴇ ᴛᴏ sᴛᴀʀᴛ ʏᴏᴜ ᴄᴀɴ ᴅᴏᴡɴʟᴏᴀᴅ ᴛᴏᴏʟs sᴜᴄʜ ᴀs "ᴄʀᴜɴᴄʜ" ᴏʀ "ᴄᴜᴘᴘ", ɪɴsᴛᴀʟʟ ᴛʜᴇᴍ ᴀɴᴅ ᴍᴀᴋᴇ ᴀ ᴍᴀɴ ᴏғ ᴛʜᴇsᴇ ᴘʀᴏɢʀᴀᴍs ᴛᴏ ʟᴇᴀʀɴ ʜᴏᴡ ᴛᴏ ᴜsᴇ ᴛʜᴇᴍ. ᴏɴᴄᴇ ᴡᴇ ʜᴀᴠᴇ ᴀ ғɪʟᴇ ᴡɪᴛʜ ᴛʜᴇ ʟɪsᴛ ᴏғ ᴘᴏssɪʙʟᴇ ᴘᴀssᴡᴏʀᴅs, ᴡᴇ ᴍᴏᴠᴇ ᴏɴ ᴛᴏ ᴛʜᴇ ɴᴇxᴛ sᴛᴇᴘ.
🔰5- ɴᴏᴡ, ᴡʜᴇɴ ᴡᴇ ʜᴀᴠᴇ ᴛʜᴇ ᴡᴏʀᴅʟɪsᴛ, ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴛᴏᴏʟ ᴡɪᴛʜ ᴛʜᴇ ɴᴇxᴛ sʏɴᴛᴀx:
> ᴘʏᴛʜᴏɴ ɪɴsᴛᴀɢʀᴀᴍ.ᴘʏ [ᴜsᴇʀɴᴀᴍᴇ] [ᴘᴀᴛʜ ᴛᴏ ᴛʜᴇ ᴡᴏʀᴅʟɪsᴛ]
(ʀᴇᴍᴇᴍʙᴇʀ ᴛᴏ ᴅᴇʟᴇᴛᴇ ᴛʜᴇ ][ ᴡʜᴇɴ ʏᴏᴜ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴄᴏᴍᴍᴀɴᴅ)
🔰6- ᴡᴀɪᴛ ᴜɴᴛɪʟ ᴛʜᴇ ᴘʀᴏᴄᴇss ɪs ғɪɴɪsʜᴇᴅ. ᴛʜᴇ ᴘʀᴏɢʀᴀᴍ ʙʏ ɪᴛsᴇʟғ ᴡɪʟʟ ʙᴇ ᴄʜᴇᴄᴋɪɴɢ ᴛʜᴇ ᴅɪғғᴇʀᴇɴᴛ ᴄᴏᴍʙᴏs ᴀɴᴅ ᴡɪʟʟ ᴀssɪɢɴ ᴀ ᴘʀᴏxʏ ᴀᴜᴛᴏᴍᴀᴛɪᴄᴀʟʟʏ.
🔰7- ɪғ ᴛʜᴇ ᴘʀᴏɢʀᴀᴍ ғɪɴᴅs ᴛʜᴇ ᴘᴀssᴡᴏʀᴅ, ɪᴛ ᴡɪʟʟ ɴᴏᴛɪғʏ ʏᴏᴜ ᴀɴᴅ sʜᴏᴡ ʏᴏᴜ ɪᴛs ᴄᴏʀʀᴇsᴘᴏɴᴅɪɴɢ ᴘᴀssᴡᴏʀᴅ
🔰"ᴄʀᴀᴄᴋɪɴɢ ᴜsɪɴɢ ʙʀᴜᴛᴇ ғᴏʀᴄᴇ (ᴏʀ ᴅɪᴄᴛɪᴏɴᴀʀʏ ᴀᴛᴛᴀᴄᴋ) ᴛᴀᴋᴇs ᴀ ʟᴏɴɢ ᴛɪᴍᴇ ᴀɴᴅ ᴏɴʟʏ ᴡᴏʀᴋs ᴡɪᴛʜ sɪᴍᴘʟᴇ ᴘᴀssᴡᴏʀᴅs. ɪᴛ ɪs ᴍᴜᴄʜ ʙᴇᴛᴛᴇʀ ᴛᴏ ᴄᴀʀʀʏ ᴏᴜᴛ ᴏᴛʜᴇʀ ᴍᴇᴛʜᴏᴅs sᴜᴄʜ ᴀs ᴘʜɪsɪɴɢ ʙᴇғᴏʀᴇ sᴜᴄᴄᴜᴍʙɪɴɢ ᴛᴏ ʙʀᴜᴛᴇ ғᴏʀᴄᴇ."
✅ ᴡʜᴀᴛ ʏᴏᴜ ᴡɪʟʟ ɴᴇᴇᴅ
♻️- ᴀɴ ᴏʙᴊᴇᴄᴛɪᴠᴇ ᴀᴄᴄᴏᴜɴᴛ ᴛᴏ ᴀᴛᴛᴀᴄᴋ
♻️- ᴀ ᴄᴏᴍᴘᴜᴛᴇʀ ᴡɪᴛʜ ᴛʜᴇ "ᴋᴀʟɪ ʟɪɴᴜx" ᴏᴘᴇʀᴀᴛɪɴɢ sʏsᴛᴇᴍ (ᴏʀ ᴀɴʏ ᴏᴛʜᴇʀ ᴅᴇʙɪᴀɴ ᴅɪsᴛʀɪʙᴜᴛɪᴏɴ).
🚸- ᴅᴇᴄᴇɴᴛ ɪɴᴛᴇʀɴᴇᴛ ᴄᴏɴɴᴇᴄᴛɪᴏɴ
♻️ɪғ ʏᴏᴜ ᴅᴇᴄɪᴅᴇ ᴛᴏ ᴜɴʙʟᴏᴄᴋ ᴛʜᴇ ᴄᴏɴᴛᴇɴᴛ ʏᴏᴜ ᴜɴᴅᴇʀsᴛᴀɴᴅ ᴘᴇʀғᴇᴄᴛʟʏ ᴛʜᴀᴛ ɪ ᴅᴏ ɴᴏᴛ ᴛᴀᴋᴇ ᴄʜᴀʀɢᴇ ᴏғ ᴛʜᴇ ᴜsᴇ ʏᴏᴜ ɢɪᴠᴇ ᴛᴏ ᴛʜᴇ ᴄᴏɴᴛᴇɴᴛ ᴏғ ᴛʜɪs ᴘᴏsᴛ ᴀɴᴅ ɪ ᴡɪʟʟ ɴᴏᴛ ʙᴇ ʀᴇsᴘᴏɴsɪʙʟᴇ ғᴏʀ ʏᴏᴜʀ ᴀᴄᴛɪᴏɴs ᴏɴᴄᴇ ʏᴏᴜ ʜᴀᴠᴇ ᴜɴʟᴏᴄᴋᴇᴅ ᴛʜᴇ ᴄᴏɴᴛᴇɴᴛ. ᴛʜᴀɴᴋs ^^
🔰1- sᴛᴀʀᴛ "ᴋᴀʟɪ ʟɪɴᴜx" ᴀɴᴅ ɢᴏ ᴛᴏ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ. ᴛʜᴇɴ, ᴛʏᴘᴇ ᴛʜᴇ ɴᴇxᴛ:
> sᴜᴅᴏ sᴜ
ᴀɴᴅ ᴘᴜᴛ ᴛʜᴇ ᴀᴅᴍɪɴ ᴘᴀssᴡᴏʀᴅ ᴛᴏ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ ɪɴ ʀᴏᴏᴛ ᴍᴏᴅᴇ.
🔰2- ɴᴏᴡ ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ᴄʟᴏɴᴇ ᴛʜᴇ ᴛᴏᴏʟs ᴛʜᴀᴛ ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ᴜsᴇ. ᴛʏᴘᴇ:
> ᴄᴅ [ᴛʜᴇ ᴘᴀᴛʜ ᴡʜᴇʀᴇ ʏᴏᴜ ᴡᴀɴᴛ ᴛᴏ ᴅᴏ ᴛʜᴀᴛ]
> ɢɪᴛ ᴄʟᴏɴᴇ ʜᴛᴛᴘs: //ɢɪᴛʜᴜʙ. ᴄᴏᴍ/ᴇᴛʜɪᴄᴀʟ-ʜ4ᴄᴋ3ʀ/ɪɴsᴛᴀɢʀᴀᴍ (ᴅᴇʟᴇᴛᴇ ᴛʜᴇ sᴘᴀᴄᴇs)
> ᴄᴅ ɪɴsᴛᴀɢʀᴀᴍ
🔰3- ᴅᴏ ᴀ ʟs. ʏᴏᴜ ᴡɪʟʟ sᴇᴇ 3 ғɪʟᴇs/ᴅɪʀᴇᴄᴛᴏʀɪᴇs: "ᴄᴏʀᴇ", "ɪɴsᴛᴀɢʀᴀᴍ.ᴘʏ" ᴀɴᴅ ᴀɴᴏᴛʜᴇʀ ғɪʟᴇ. ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ɢɪᴠᴇ ᴘᴇʀᴍɪssɪᴏɴs ᴛᴏ ᴛʜᴇ ᴛᴏᴏʟ. ᴛʏᴘᴇ ɪɴ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ:
> ᴄʜᴍᴏᴅ +x ɪɴsᴛᴀɢʀᴀᴍ.ᴘʏ
🔰4- ɴᴏᴡ ᴡᴇ ɴᴇᴇᴅ ᴛᴏ ᴄʀᴇᴀᴛᴇ ᴀ ᴡᴏʀᴅʟɪsᴛ ғᴏʀ ᴘᴀssᴡᴏʀᴅs. ɪ ᴡɪʟʟ ɴᴏᴛ ᴇxᴘʟᴀɪɴ ʜᴏᴡ ᴛᴏ ᴅᴏ ᴛʜɪs ʙᴇᴄᴀᴜsᴇ ɪᴛ ɪs ᴄᴏᴍᴍᴏɴ sᴇɴsᴇ, ʙᴜᴛ ɪғ ʏᴏᴜ ʜᴀᴠᴇ ɴᴏ ɪᴅᴇᴀ ᴡʜᴇʀᴇ ᴛᴏ sᴛᴀʀᴛ ʏᴏᴜ ᴄᴀɴ ᴅᴏᴡɴʟᴏᴀᴅ ᴛᴏᴏʟs sᴜᴄʜ ᴀs "ᴄʀᴜɴᴄʜ" ᴏʀ "ᴄᴜᴘᴘ", ɪɴsᴛᴀʟʟ ᴛʜᴇᴍ ᴀɴᴅ ᴍᴀᴋᴇ ᴀ ᴍᴀɴ ᴏғ ᴛʜᴇsᴇ ᴘʀᴏɢʀᴀᴍs ᴛᴏ ʟᴇᴀʀɴ ʜᴏᴡ ᴛᴏ ᴜsᴇ ᴛʜᴇᴍ. ᴏɴᴄᴇ ᴡᴇ ʜᴀᴠᴇ ᴀ ғɪʟᴇ ᴡɪᴛʜ ᴛʜᴇ ʟɪsᴛ ᴏғ ᴘᴏssɪʙʟᴇ ᴘᴀssᴡᴏʀᴅs, ᴡᴇ ᴍᴏᴠᴇ ᴏɴ ᴛᴏ ᴛʜᴇ ɴᴇxᴛ sᴛᴇᴘ.
🔰5- ɴᴏᴡ, ᴡʜᴇɴ ᴡᴇ ʜᴀᴠᴇ ᴛʜᴇ ᴡᴏʀᴅʟɪsᴛ, ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴛᴏᴏʟ ᴡɪᴛʜ ᴛʜᴇ ɴᴇxᴛ sʏɴᴛᴀx:
> ᴘʏᴛʜᴏɴ ɪɴsᴛᴀɢʀᴀᴍ.ᴘʏ [ᴜsᴇʀɴᴀᴍᴇ] [ᴘᴀᴛʜ ᴛᴏ ᴛʜᴇ ᴡᴏʀᴅʟɪsᴛ]
(ʀᴇᴍᴇᴍʙᴇʀ ᴛᴏ ᴅᴇʟᴇᴛᴇ ᴛʜᴇ ][ ᴡʜᴇɴ ʏᴏᴜ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴄᴏᴍᴍᴀɴᴅ)
🔰6- ᴡᴀɪᴛ ᴜɴᴛɪʟ ᴛʜᴇ ᴘʀᴏᴄᴇss ɪs ғɪɴɪsʜᴇᴅ. ᴛʜᴇ ᴘʀᴏɢʀᴀᴍ ʙʏ ɪᴛsᴇʟғ ᴡɪʟʟ ʙᴇ ᴄʜᴇᴄᴋɪɴɢ ᴛʜᴇ ᴅɪғғᴇʀᴇɴᴛ ᴄᴏᴍʙᴏs ᴀɴᴅ ᴡɪʟʟ ᴀssɪɢɴ ᴀ ᴘʀᴏxʏ ᴀᴜᴛᴏᴍᴀᴛɪᴄᴀʟʟʏ.
🔰7- ɪғ ᴛʜᴇ ᴘʀᴏɢʀᴀᴍ ғɪɴᴅs ᴛʜᴇ ᴘᴀssᴡᴏʀᴅ, ɪᴛ ᴡɪʟʟ ɴᴏᴛɪғʏ ʏᴏᴜ ᴀɴᴅ sʜᴏᴡ ʏᴏᴜ ɪᴛs ᴄᴏʀʀᴇsᴘᴏɴᴅɪɴɢ ᴘᴀssᴡᴏʀᴅ
Sle hacking yemiyastemr bot nw mangnawm neger yzual telegram hacking social media hacking mangnawnm neger yzual sile hulum hacking neger ale arif bot new start belu ena temaru
https://t.me/ethical_hacking_bot?start=r0429791998
https://t.me/ethical_hacking_bot?start=r0429791998
Ethio astronomy🇪🇹💓
This group is the official Ethiopian space
And physics researchers and lovers.
Now,u can talk ever things u wanna want to talk.
For Amharic version join our sister group
@etsus
@mdyam
https://t.me/yotorastronomy
This group is the official Ethiopian space
And physics researchers and lovers.
Now,u can talk ever things u wanna want to talk.
For Amharic version join our sister group
@etsus
@mdyam
https://t.me/yotorastronomy
Telegram
Éthio Àstronomers
New year 🌞 new era!
Hello welcome
Here, you could talk and share knowledges on things related to
👉 astronomy👉 mythology👉 physics👉 physiology👉
And more...
Hello welcome
Here, you could talk and share knowledges on things related to
👉 astronomy👉 mythology👉 physics👉 physiology👉
And more...
😍 Linux Programing Collection 😍
......... @blackhat_hacking .........
Download link:-
https://drive.google.com/folderview?id=10t5eCEjq4VcdfoDwW_F5u9pCCa8YBIUl
❤️Join us for more expensiv & Powerfull Updates for free of cost❤️
➖@BlackHat_Hacking ➖
......... @blackhat_hacking .........
Download link:-
https://drive.google.com/folderview?id=10t5eCEjq4VcdfoDwW_F5u9pCCa8YBIUl
❤️Join us for more expensiv & Powerfull Updates for free of cost❤️
➖@BlackHat_Hacking ➖
🎯10 ምርጥ የ hacking os የሚባሉት👇👇👇
1. Kali linux:-
🎯 ካሊ ሊኑክስ የላቀ የፔንቴሬቲንግ ፍተሻ እና የደህንነት ማረጋገጫ ኦፍ ሴተሮችን መሠረት ያደረገ Debian መሰረት ያደረገ የLinux ስርጭት ነው. ካሊ ለበርካታ የመረጃ ደህንነት ተግባራት ማለትም እንደ penetration testing, የደህንነት ምርምር, ኮምፕዩኒኬሽን እና የተራቀቀ ኢንጂነሪንግ ያሉ በርካታ መቶ መሳሪያዎችን ይዟል !
2. Black box
🎯 BackBox ኔትቡክን መሰረት ያደረገ የLinux ስርጭት እና የኔትወርክ እና ኢንፎርሜሽን ስርዓቶች ትንታኔ መሳሪያዎችን የሚያቀርብ የዳሰሳ ጥናት እና የደህንነት ግምገማ ነው. ለደህንነት ምርመራዎች የሚያስፈልጉትን የተሟላ መሳሪያዎች ያካትታል.
3. Parrot security
🎯 parrot linux ኮምፒውተር ጥበቃ ላይ ትኩረት በማድረግ የደቢያን ስርጭት ስር ነው. ለዳሰሳ ሙከራ, ተጋላጭነት ግምገማ እና ማቃለያ, ኮምፒዩቲን ጠንቋዮች እና ስም-አልባ የድር አሰሳ ተብሎ የተዘጋጀ ነው.
4. DEFT linux
🎯 ዲፋይ (ዲጂታል ፊይናሚል ኤንድ ፊክስስስ ቱልኪት/toolkit) የዲኤፍኤስ (Duplicum for Digital Evidence & Forensics Toolkit) ለኮምፒውተር ኮምፒዩቲንሲስ የተሰራጨ ማከፋፈያ ነው. ይህ ስርዓቱ በሂደት ላይ ያለ ስርጭት ወይም ብልሹ መሳሪያ (ትንንሽ ዲስኮች, ወዘተ ... ወዘተ ...) . የ DEFT ስርዓት በጂ.ኤ.ን.ዩ linux ላይ የተመሠረተ ነው, በቀጥታ ማጫወት ይችላል (በዲቪዲ ማጫወቻ በኩል ወይም በ USB pendrive በኩል), በ VMware ወይም ቨርቹዋል ቨርችዋል ላይ እንደ ቨርቹዋል ፑልኪት/Toolkit ተጭኖ ይሠራል.
🎯 DEFT L.X.D.E ን እንደ ዴስክቶፕ ሁኔታ ይጠቀማል እና በ Linux ዊንዶውስ በlinux ስርዓተ-መተግበሪያን ለመተግበር W.I.N.E. ለመሳሪያ አስተዳደር አመቺ የማሳያ አቀናባሪ አለው.
5. Samurai web testing frame work
🎯 የsamurai web-testing framework. የSamurai ድህረ መመርመሪያ ማዕቀፍ እንደ ዌብ ፔን-መመርያ(pen-testing) አካባቢ ለመተግበር ቅድመ-መዋቅር በ ቨርቹዋል ቦክስ እና ቪ.ኤ.ም ዌር የተደገፈ ምናባዊ ማሽን ነው።
🎯 ቪ.ኤ.ም ምርጥ ምንጭ እና ነፃ ድር ጣቢያዎችን በመሞከር እና ድር ጣቢያዎች ላይ የሚያተኩሩ ነጻ መሳሪያዎችን ይዟል.
6. network security toolkit
🎯 የአውታረ መረብ ደህንነት መሣሪያ ስብስብ (NST) መደበኛውን ደህንነት እና አውታረ መረብ ምርመራ እና ቁጥጥር ተግባሮችን ለማከናወን ነጻ እና ክፍት ምንጭ የኮምፒተር ደህንነት እና አውታረ መረብ መሳሪያዎችን የሚያቀርብ ሊነክስ ሊኖረን የሚችል የቀጥታ ዲቪዲ / ዩኤስቢ ፍላሽ አንጻር ነው.
🎯 ስርጭቱ እንደ ኔት machinesን ሰርቨር (Server) አስተናጋጅ በሆኑ አውታረመረብ ሴኪዩሪቲ ትንተና, ማረጋገጫ እና ቁጥጥር መሳሪያ መጠቀም ይቻላል.
7. Black Arch
🎯 BlackArch ከፍተኛ መጠን ያላቸው የሳይበር ደህንነት መሳሪያዎችን በArch linux ላይ በመመርኮዝ የግጥም ጣልቃገብነት ስርጭት ስርጭት ነው. ለስለላ ሙከራዎች እና ለደህንነት ተመራማሪዎች የተፈጠረ ክፍት ምንጭ ማሰራጫ ነው።
8. cyborg hawk linux
🎯Cyborg Hawk Linux በ unbuntu ላይ የተመሠረተ የሊንክስ Hacking Distro እንደ ፔንታስቲን ሊንክስ cyborg አውታር ተብሎም ይታወቃል።
🎯 Cyberg Hawk Distro ለኔትወርክ ደህንነት እና ለግምገማ ጥቅም ላይ ሊውል ይችላል በተጨማሪም ለዲጂታል የወንጀል ምርመራዎች.
9. Gnack track
🎯 Gnack track የቅጥያው ሙከራ መሳሪያዎችን እና የጂኖም ዴስክቶፕን ለማዋሃድ ክፍት እና ነፃ ፕሮጀክት ነው. GnackTrack ለፔኔትቴሽን ሙከራ የተቀረፀ እና በunbuntu ላይ የተመሠረተ የቀጥታ (ሊጫን የሚችል) ስርጭት ነው።
10. NodeZero
🎯 NodeZero እንደ የዲንፕልቲንግ ፍተሻ ሊያገለግል ይችላል ይህም እንደ ሙሉ ስርዓት (ኢንተርስቲ) የተሠራው unbuntu መሰረት ነው።
🎯 NodeZero ስርዓትዎ ሁልጊዜ የዘመነ ሆኖ እንዲቀጥል የዩቡዱን የውሂብ ማከማቻዎችን ይጠቀማል. NodeZero ከሌሎች የንዑስ ምድብ, የአውታረ መረብ እና በይነመረብ ምድብ ነፃ ሶፍትዌር ነው።
________
🚩10 የሀኪንግ አይነቶች አሉ እነሱም:-
1. Bait and switch
2. Cookie theft
3. click jacking attack
4. virus, Trojan
5. Phishing
6. Eaves Dropping (Passive attacks)
7. Fake WAP
8. Water hole attacks
9. Denial of service(Dos) and Distributed Denial Of Service(DDOS). እና
10. Keylogger ናቸው !
1. Kali linux:-
🎯 ካሊ ሊኑክስ የላቀ የፔንቴሬቲንግ ፍተሻ እና የደህንነት ማረጋገጫ ኦፍ ሴተሮችን መሠረት ያደረገ Debian መሰረት ያደረገ የLinux ስርጭት ነው. ካሊ ለበርካታ የመረጃ ደህንነት ተግባራት ማለትም እንደ penetration testing, የደህንነት ምርምር, ኮምፕዩኒኬሽን እና የተራቀቀ ኢንጂነሪንግ ያሉ በርካታ መቶ መሳሪያዎችን ይዟል !
2. Black box
🎯 BackBox ኔትቡክን መሰረት ያደረገ የLinux ስርጭት እና የኔትወርክ እና ኢንፎርሜሽን ስርዓቶች ትንታኔ መሳሪያዎችን የሚያቀርብ የዳሰሳ ጥናት እና የደህንነት ግምገማ ነው. ለደህንነት ምርመራዎች የሚያስፈልጉትን የተሟላ መሳሪያዎች ያካትታል.
3. Parrot security
🎯 parrot linux ኮምፒውተር ጥበቃ ላይ ትኩረት በማድረግ የደቢያን ስርጭት ስር ነው. ለዳሰሳ ሙከራ, ተጋላጭነት ግምገማ እና ማቃለያ, ኮምፒዩቲን ጠንቋዮች እና ስም-አልባ የድር አሰሳ ተብሎ የተዘጋጀ ነው.
4. DEFT linux
🎯 ዲፋይ (ዲጂታል ፊይናሚል ኤንድ ፊክስስስ ቱልኪት/toolkit) የዲኤፍኤስ (Duplicum for Digital Evidence & Forensics Toolkit) ለኮምፒውተር ኮምፒዩቲንሲስ የተሰራጨ ማከፋፈያ ነው. ይህ ስርዓቱ በሂደት ላይ ያለ ስርጭት ወይም ብልሹ መሳሪያ (ትንንሽ ዲስኮች, ወዘተ ... ወዘተ ...) . የ DEFT ስርዓት በጂ.ኤ.ን.ዩ linux ላይ የተመሠረተ ነው, በቀጥታ ማጫወት ይችላል (በዲቪዲ ማጫወቻ በኩል ወይም በ USB pendrive በኩል), በ VMware ወይም ቨርቹዋል ቨርችዋል ላይ እንደ ቨርቹዋል ፑልኪት/Toolkit ተጭኖ ይሠራል.
🎯 DEFT L.X.D.E ን እንደ ዴስክቶፕ ሁኔታ ይጠቀማል እና በ Linux ዊንዶውስ በlinux ስርዓተ-መተግበሪያን ለመተግበር W.I.N.E. ለመሳሪያ አስተዳደር አመቺ የማሳያ አቀናባሪ አለው.
5. Samurai web testing frame work
🎯 የsamurai web-testing framework. የSamurai ድህረ መመርመሪያ ማዕቀፍ እንደ ዌብ ፔን-መመርያ(pen-testing) አካባቢ ለመተግበር ቅድመ-መዋቅር በ ቨርቹዋል ቦክስ እና ቪ.ኤ.ም ዌር የተደገፈ ምናባዊ ማሽን ነው።
🎯 ቪ.ኤ.ም ምርጥ ምንጭ እና ነፃ ድር ጣቢያዎችን በመሞከር እና ድር ጣቢያዎች ላይ የሚያተኩሩ ነጻ መሳሪያዎችን ይዟል.
6. network security toolkit
🎯 የአውታረ መረብ ደህንነት መሣሪያ ስብስብ (NST) መደበኛውን ደህንነት እና አውታረ መረብ ምርመራ እና ቁጥጥር ተግባሮችን ለማከናወን ነጻ እና ክፍት ምንጭ የኮምፒተር ደህንነት እና አውታረ መረብ መሳሪያዎችን የሚያቀርብ ሊነክስ ሊኖረን የሚችል የቀጥታ ዲቪዲ / ዩኤስቢ ፍላሽ አንጻር ነው.
🎯 ስርጭቱ እንደ ኔት machinesን ሰርቨር (Server) አስተናጋጅ በሆኑ አውታረመረብ ሴኪዩሪቲ ትንተና, ማረጋገጫ እና ቁጥጥር መሳሪያ መጠቀም ይቻላል.
7. Black Arch
🎯 BlackArch ከፍተኛ መጠን ያላቸው የሳይበር ደህንነት መሳሪያዎችን በArch linux ላይ በመመርኮዝ የግጥም ጣልቃገብነት ስርጭት ስርጭት ነው. ለስለላ ሙከራዎች እና ለደህንነት ተመራማሪዎች የተፈጠረ ክፍት ምንጭ ማሰራጫ ነው።
8. cyborg hawk linux
🎯Cyborg Hawk Linux በ unbuntu ላይ የተመሠረተ የሊንክስ Hacking Distro እንደ ፔንታስቲን ሊንክስ cyborg አውታር ተብሎም ይታወቃል።
🎯 Cyberg Hawk Distro ለኔትወርክ ደህንነት እና ለግምገማ ጥቅም ላይ ሊውል ይችላል በተጨማሪም ለዲጂታል የወንጀል ምርመራዎች.
9. Gnack track
🎯 Gnack track የቅጥያው ሙከራ መሳሪያዎችን እና የጂኖም ዴስክቶፕን ለማዋሃድ ክፍት እና ነፃ ፕሮጀክት ነው. GnackTrack ለፔኔትቴሽን ሙከራ የተቀረፀ እና በunbuntu ላይ የተመሠረተ የቀጥታ (ሊጫን የሚችል) ስርጭት ነው።
10. NodeZero
🎯 NodeZero እንደ የዲንፕልቲንግ ፍተሻ ሊያገለግል ይችላል ይህም እንደ ሙሉ ስርዓት (ኢንተርስቲ) የተሠራው unbuntu መሰረት ነው።
🎯 NodeZero ስርዓትዎ ሁልጊዜ የዘመነ ሆኖ እንዲቀጥል የዩቡዱን የውሂብ ማከማቻዎችን ይጠቀማል. NodeZero ከሌሎች የንዑስ ምድብ, የአውታረ መረብ እና በይነመረብ ምድብ ነፃ ሶፍትዌር ነው።
________
🚩10 የሀኪንግ አይነቶች አሉ እነሱም:-
1. Bait and switch
2. Cookie theft
3. click jacking attack
4. virus, Trojan
5. Phishing
6. Eaves Dropping (Passive attacks)
7. Fake WAP
8. Water hole attacks
9. Denial of service(Dos) and Distributed Denial Of Service(DDOS). እና
10. Keylogger ናቸው !
👨💻የሀከር አይነቶች|Types of Hackers👇
👨💻ሀከሮች | hackers በሶስት ወሳኝ አይነቶች ይከፈላሉ እነሱም👇
🎯 white hat
🎯 black hat and
🎯 Grey hat ናቸው !
🚩White Hat Hackers👨💻 :- እነዚህ ሀከሮች የሀኪንግ እዉቀታቸዉን ተጠቅመዉ ህጋዊ የመረጃ ብርበራ የሚያደርጉ ናቸዉ ስለዚህ ጥሩ ሀከሮች ነዉ የሚባሉት እንዲሁም Security expert በመባል ይታወቃሉ።
🚩Black Hat Hackers👨💻 :- የነዚህ አይነት ሀከሮች ብዙ ጊዜ crackers ይባላሉ።
👉 እነዚህ ሀከሮች የሀኪንግ እዉቀታቸዉን ተጠቅመዉ ህገወጥ ተግባራትን ያከናዉናሉ።
👉ለምሳሌ ልክ እነደ credit card ዘረፋ፣ባንኮችን ሀክ፣አስፈላጊ መረጃ ስርቆት ወ.ዘ.ተ!
👉 በተጨማሪም ክሬዲት ካርድ ዘረፋ ላይ የሚሳተፉ ሀከሮች ካርደር/carder በመባል ይታወቃሉ !
🚩Grey Hat Hackers👨💻 :- Grey hat የምንላቸዉ በwhite hat እና በblack hat መካከል የሚገኙ ቅልቅል ናቸዉ።
🎯 ማለትም Grey hat ሀከሮች ሲያሰኛቸው black hat ወይም ደግሞ white hat ይሆናሉ !
🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯
👇 👨💻የሀከሮች ደረጃ👨💻👇
🎯 🤓Script kiddie🤓 :- እነዚህ የሀኪንግ ልምድ የሌላቸዉ ግለሰቦች ሲሆኑ ሀከር መሆን የሚፈልጉ ናቸዉ ሀክ ለማድረግ የሚጠቀሙትም የተዘጋጀ ሶፍትዌር ነዉ!
👉 ብዙ ጊዜም ልምድ ስለሌላቸዉ እራሳቸዉን harm ያደርጋሉ።
🎯 Intermediate👨💻hackers👌 :-
ከ🤓script kiddies🤓 የበለጠ የሀኪንግ ልምድ እንዲሁም እዉቀት ያላቸዉ ሀከሮች ናቸዉ።
👉ግን የራሳቸዉን የሀኪንግ ሶፍትዌር መስራት አይችሉም ነገርግን ጥሩ👌 ልምድ ያላቸዉ ሀከሮች ናቸዉ።
🎯 😎Professional or Elite hackers👨💻 :-
🚩እነዚህ አሪፍ ልምድ ያላቸዉ ሀከሮች የራሳቸዉን የሀኪንግ ሶፍትዌር መስራት ይችላሉ፤ስለሆነም የትኛዉም አይነት system ሰብረዉ መግባትና ራሳቸዉን የመደበቅ ልምድ አላቸዉ።👌
👨💻ሀከሮች | hackers በሶስት ወሳኝ አይነቶች ይከፈላሉ እነሱም👇
🎯 white hat
🎯 black hat and
🎯 Grey hat ናቸው !
🚩White Hat Hackers👨💻 :- እነዚህ ሀከሮች የሀኪንግ እዉቀታቸዉን ተጠቅመዉ ህጋዊ የመረጃ ብርበራ የሚያደርጉ ናቸዉ ስለዚህ ጥሩ ሀከሮች ነዉ የሚባሉት እንዲሁም Security expert በመባል ይታወቃሉ።
🚩Black Hat Hackers👨💻 :- የነዚህ አይነት ሀከሮች ብዙ ጊዜ crackers ይባላሉ።
👉 እነዚህ ሀከሮች የሀኪንግ እዉቀታቸዉን ተጠቅመዉ ህገወጥ ተግባራትን ያከናዉናሉ።
👉ለምሳሌ ልክ እነደ credit card ዘረፋ፣ባንኮችን ሀክ፣አስፈላጊ መረጃ ስርቆት ወ.ዘ.ተ!
👉 በተጨማሪም ክሬዲት ካርድ ዘረፋ ላይ የሚሳተፉ ሀከሮች ካርደር/carder በመባል ይታወቃሉ !
🚩Grey Hat Hackers👨💻 :- Grey hat የምንላቸዉ በwhite hat እና በblack hat መካከል የሚገኙ ቅልቅል ናቸዉ።
🎯 ማለትም Grey hat ሀከሮች ሲያሰኛቸው black hat ወይም ደግሞ white hat ይሆናሉ !
🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯
👇 👨💻የሀከሮች ደረጃ👨💻👇
🎯 🤓Script kiddie🤓 :- እነዚህ የሀኪንግ ልምድ የሌላቸዉ ግለሰቦች ሲሆኑ ሀከር መሆን የሚፈልጉ ናቸዉ ሀክ ለማድረግ የሚጠቀሙትም የተዘጋጀ ሶፍትዌር ነዉ!
👉 ብዙ ጊዜም ልምድ ስለሌላቸዉ እራሳቸዉን harm ያደርጋሉ።
🎯 Intermediate👨💻hackers👌 :-
ከ🤓script kiddies🤓 የበለጠ የሀኪንግ ልምድ እንዲሁም እዉቀት ያላቸዉ ሀከሮች ናቸዉ።
👉ግን የራሳቸዉን የሀኪንግ ሶፍትዌር መስራት አይችሉም ነገርግን ጥሩ👌 ልምድ ያላቸዉ ሀከሮች ናቸዉ።
🎯 😎Professional or Elite hackers👨💻 :-
🚩እነዚህ አሪፍ ልምድ ያላቸዉ ሀከሮች የራሳቸዉን የሀኪንግ ሶፍትዌር መስራት ይችላሉ፤ስለሆነም የትኛዉም አይነት system ሰብረዉ መግባትና ራሳቸዉን የመደበቅ ልምድ አላቸዉ።👌
👥 REFERRAL SYSTEM
▫ Earnings: ฿0.00000000
▫ Referrals: 0
▫ Active Referrals: 0
▫ Commission: 10% of referrals earnings.
▫ Bonus: ฿
▫ Link: https://t.me/BTC_Miner_ag_bot?start=1260937189
▫ Earnings: ฿0.00000000
▫ Referrals: 0
▫ Active Referrals: 0
▫ Commission: 10% of referrals earnings.
▫ Bonus: ฿
0
.00010000
for every referrals.▫ Link: https://t.me/BTC_Miner_ag_bot?start=1260937189
unidentified flying objects (UFO)
Here we study and share info related as UFOS or Alians So you can share whatever you got about them by @Killererr
https://t.me/UFOOF
Here we study and share info related as UFOS or Alians So you can share whatever you got about them by @Killererr
https://t.me/UFOOF
Telegram
unidentified flying objects (UFO)
Here we study and share info related as UFOS or Alians So you can share whatever you got about them by @Killererr
KitPloit - PenTest Tools!
SwiftBelt - A macOS Enumeration Tool Inspired By Harmjoy'S Windows-based Seatbelt Enumeration Tool
https://1.bp.blogspot.com/-1WFiHYKtay8/X30kM0PVpwI/AAAAAAAAT_s/dyQASqeGfjgaJ9tfITAwrPrg1x8hF6G0gCNcBGAsYHQ/w640-h282/SwiftBelt_1_swiftbelt2.png SwiftBelt is a macOS enumerator inspired by @harmjoy's Windows-based Seatbelt enumeration tool. SwiftBelt does not utilize any command line utilities and instead uses Swift code (leveraging the Cocoa Framework, Foundation libraries, OSAKit libraries, etc.) to perform system enumeration. This can be leveraged on the offensive side to perform enumeration once you gain access to a macOS host. I intentionally did not include any functions that cause pop-ups (ex: keychain enumeration).
Thanks Ramos04 for contributing code to look for various Objective See tools and mattreduce for contributing code for zshell history as well as azure creds.
Steps
You can run the included SwiftBelt mach-o binary in the root directory of this repo or you can edit the Swift code and rebuild a new binary.
To use the included mach-o:
1. Note: I did not sign the included mach-o. Therefore you will need to take these steps to remove the quarantine attribute in order to run: Once downloaded, copy to the desired host and clear the quarantine attribute ($ xattr -c SwiftBelt) and set as executable ($ chmod +x SwiftBelt)
2. To see the help menu: ./SwiftBelt -h
Help menu:
SwiftBelt Options:
-SecurityTools --> Check for the presence of common macOS security tools (at least the ones I am familiar with)
-SystemInfo --> Pull back system info (wifi SSID info, open directory node info, internal IPs, ssh/aws/gcloud/azure-cli cred info, basic system info). If present on the host, this tool will display the contents of ssh keys, known hosts file, aws cred files, and gcloud token info
-Clipboard --> Dump clipboard contents
-RunningApps --> List all running apps
-ListUsers --> List local user accounts
-LaunchAgents --> List launch agents, launch daemons, and configuration profile files
-BrowserHistory --> Attempt to pull Safari, Firefox, Chrome, and Quarantine history (note as FYI: if Chrome or Firefox is actively running, the tool will not be able to read the locked database to extract info)
-SlackExtract --> Check if Slack is present and if so read cookie, downloads, and workspaces info (leverages research done by Cody Thomas)
-ShellHistory --> Read shell (Bash or Zsh) history content
-Bookmarks --> Read Chrome saved bookmarks
Usage:
To run all options: ./SwiftBelt
To specify certain options: ./SwiftBelt [option1] [option2] [option3]...
Example: ./SwiftBelt -SystemInfo -Clipboard -SecurityTools ...
To edit the Swift code and rebuild your own mach-o:
1.
Open the xcodeproj file for SwiftBelt in Xcode
2.
Edit the code in main.swift code as needed in Xcode
3.
From a terminal cd into the SwiftBelt directory and run: "swift build" to generate the binary. The binary will be dropped in the .build/debug folder inside of the SwiftBelt folder and will be named SwiftBelt
4.
Copy to the desired host and clear the quarantine attribute ($ xattr -c SwiftBelt) and set as executable ($ chmod +x SwiftBelt)
5.
Execute
Detection
Though this tool does not use any command line utilities (which are easy to detect), this tool does read from several files on the system which can be detected by any tools that leverage the Endpoint Security Framework (these file reads in particular are captured by ES_EVENT_TYPE_NOTIFY_OPEN events within ESF). Download SwiftBelt
SwiftBelt - A macOS Enumeration Tool Inspired By Harmjoy'S Windows-based Seatbelt Enumeration Tool
https://1.bp.blogspot.com/-1WFiHYKtay8/X30kM0PVpwI/AAAAAAAAT_s/dyQASqeGfjgaJ9tfITAwrPrg1x8hF6G0gCNcBGAsYHQ/w640-h282/SwiftBelt_1_swiftbelt2.png SwiftBelt is a macOS enumerator inspired by @harmjoy's Windows-based Seatbelt enumeration tool. SwiftBelt does not utilize any command line utilities and instead uses Swift code (leveraging the Cocoa Framework, Foundation libraries, OSAKit libraries, etc.) to perform system enumeration. This can be leveraged on the offensive side to perform enumeration once you gain access to a macOS host. I intentionally did not include any functions that cause pop-ups (ex: keychain enumeration).
Thanks Ramos04 for contributing code to look for various Objective See tools and mattreduce for contributing code for zshell history as well as azure creds.
Steps
You can run the included SwiftBelt mach-o binary in the root directory of this repo or you can edit the Swift code and rebuild a new binary.
To use the included mach-o:
1. Note: I did not sign the included mach-o. Therefore you will need to take these steps to remove the quarantine attribute in order to run: Once downloaded, copy to the desired host and clear the quarantine attribute ($ xattr -c SwiftBelt) and set as executable ($ chmod +x SwiftBelt)
2. To see the help menu: ./SwiftBelt -h
Help menu:
SwiftBelt Options:
-SecurityTools --> Check for the presence of common macOS security tools (at least the ones I am familiar with)
-SystemInfo --> Pull back system info (wifi SSID info, open directory node info, internal IPs, ssh/aws/gcloud/azure-cli cred info, basic system info). If present on the host, this tool will display the contents of ssh keys, known hosts file, aws cred files, and gcloud token info
-Clipboard --> Dump clipboard contents
-RunningApps --> List all running apps
-ListUsers --> List local user accounts
-LaunchAgents --> List launch agents, launch daemons, and configuration profile files
-BrowserHistory --> Attempt to pull Safari, Firefox, Chrome, and Quarantine history (note as FYI: if Chrome or Firefox is actively running, the tool will not be able to read the locked database to extract info)
-SlackExtract --> Check if Slack is present and if so read cookie, downloads, and workspaces info (leverages research done by Cody Thomas)
-ShellHistory --> Read shell (Bash or Zsh) history content
-Bookmarks --> Read Chrome saved bookmarks
Usage:
To run all options: ./SwiftBelt
To specify certain options: ./SwiftBelt [option1] [option2] [option3]...
Example: ./SwiftBelt -SystemInfo -Clipboard -SecurityTools ...
To edit the Swift code and rebuild your own mach-o:
1.
Open the xcodeproj file for SwiftBelt in Xcode
2.
Edit the code in main.swift code as needed in Xcode
3.
From a terminal cd into the SwiftBelt directory and run: "swift build" to generate the binary. The binary will be dropped in the .build/debug folder inside of the SwiftBelt folder and will be named SwiftBelt
4.
Copy to the desired host and clear the quarantine attribute ($ xattr -c SwiftBelt) and set as executable ($ chmod +x SwiftBelt)
5.
Execute
Detection
Though this tool does not use any command line utilities (which are easy to detect), this tool does read from several files on the system which can be detected by any tools that leverage the Endpoint Security Framework (these file reads in particular are captured by ES_EVENT_TYPE_NOTIFY_OPEN events within ESF). Download SwiftBelt
KitPloit - PenTest & Hacking Tools
SwiftBelt - A macOS Enumeration Tool Inspired By Harmjoy'S Windows-based Seatbelt Enumeration Tool
The Hacker News
55 New Security Flaws Reported in Apple Software and Services
A team of five security researchers analyzed several Apple online services for three months and found as many as 55 vulnerabilities, 11 of which are critical in severity.
The flaws — including 29 high severity, 13 medium severity, and 2 low severity vulnerabilities — could have allowed an attacker to "fully compromise both customer and employee applications, launch a worm capable of
55 New Security Flaws Reported in Apple Software and Services
A team of five security researchers analyzed several Apple online services for three months and found as many as 55 vulnerabilities, 11 of which are critical in severity.
The flaws — including 29 high severity, 13 medium severity, and 2 low severity vulnerabilities — could have allowed an attacker to "fully compromise both customer and employee applications, launch a worm capable of
The Hacker News
55 New Security Flaws Reported in Apple Software and Services
Researchers analyzed several Apple online services for three months and found as many as 55 vulnerabilities, 11 of which are critical in severity.