PRINT
PRINT
SEND MAIL
SEND MAIL
NEW TOOLS

Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email cybersec@cybeseclabs.com then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

BscanInformation GatheringKali LinuxNEW TOOLSNmapRegular ExpressionsScanUnicornscanWordlistWordlists

Bscan – An Asynchronous Target Enumeration Tool

Synopsisbscan is a command-line utility to perform active information gathering and service enumeration. At its core, bscan asynchronously spawns processes of well-known scanning utilities, repurposing scan results into highlighted console output and a well-defined directory structure.Installationbscan was written to be run on Kali Linux, but there is nothing inherently preventing it from running on any OS with the appropriate tools installed.Download the latest packaged version from PyPI:pip install bscanOr get the bleeding-edge version from version control:pip install Usagebscan has a wide variety of…

BincatCode AnalysisIDA PluginIDA ProNEW TOOLS

Bincat – Binary Code Static Analyser, With IDA Integration

BinCAT is a static Binary Code Analysis Toolkit, designed to help reverse engineers, directly from IDA.It features:value analysis (registers and memory)taint analysistype reconstruction and propagationbackward and forward analysisuse-after-free and double-free detectionIn actionYou can check (an older version of) BinCAT in action here:Basic analysisUsing data taintingCheck the tutorial out to see the corresponding tasks.Quick FAQSupported host platforms:IDA plugin: all, version 6.9 or later (BinCAT uses PyQt, not PySide)analyzer (local or remote): Linux, Windows, macOS (maybe)Supported CPU for analysis (for now):x86-32ARMv7ARMv8PowerPCInstallationOnly IDA v6.9 or later (7…

Cyber BitesCyber Threats

60 percent of all publicly reported hacks attributed to two hacker groups.

Two hacker groups are behind 60% of all publicly reported cryptocurrency exchange hacks and are believed to have stolen around $1 billion worth of cryptocurrency, according to a report published last week by blockchain analysis firm Chainalysis. “On average, the hacks we traced from the two prominent hacking groups stole $90 million per hack,” said Chainalysis. Source: ZDNet The post 60 percent of all publicly reported hacks attributed to two hacker groups. appeared first on IT Security Guru.

Cyber BitesCyber Threats

European businesses hit with 60,000 data breaches in eight months.

More than 59,000 data breaches have been reported across Europe since data protection laws were brought in last year, new figures have revealed. The Netherlands, Germany and the UK topped the list of the most reported breaches in the eight months since new GDPR laws came into force, according to law firm DLA Piper. The breaches, which range from minor errors such as missent emails to major cyber hacks, were reported by public and private organisations in the 26 European countries where data is…

Cyber BitesCyber Threats

GoDaddy Hole still being exploited by hackers.

Godaddy.com, the world’s largest domain name registrar, recently addressed an authentication weakness that cybercriminals were using to blast out spam through legitimate, dormant domains. But several more recent malware spam campaigns suggest GoDaddy’s fix hasn’t gone far enough, and that scammers likely still have a sizable arsenal of hijacked GoDaddy domains at their disposal. Source: Krebs on Security The post GoDaddy Hole still being exploited by hackers. appeared first on IT Security Guru.

Cyber BitesCyber Threats

Hacker behind ‘Collection #1’ Data Dump revealed.

Researchers say they have identified the threat actor behind the massive “Collection #1” data dump which exposed hundreds of millions of credentials on a hacking forum in January. Recorded Future researchers said this weekend that an individual using the moniker “C0rpz” has claimed as early as Jan. 7 to be the original creator and seller of the Collection #1 data. The original database of breached emails – totalling 773 million unique email addresses –was discovered a popular underground hacking forum on Jan. 17. Source:…

Cyber BitesCyber Threats

Data breach announced by Huddle House.

US-based casual dining and fast food restaurant chain Huddle House announced late Friday last week a security breach that impacted its point of sale (POS) system. “Criminals compromised a third-party point of sale (POS) vendor’s data system and utilized the vendor’s assistance tools to gain remote access-and the ability to deploy malware-to some Huddle House corporate and franchisee POS systems,” Huddle House said in a security alert listed on its front page. Source: ZDNet The post Data breach announced by Huddle House. appeared first…

FnordHex EditorMacNEW TOOLSRegular ExpressionsYarayarGen

Fnord – Pattern Extractor For Obfuscated Code

Fnord is a pattern extractor for obfuscated codeDescriptionFnord has two main functions:Extract byte sequences and create some statisticsUse these statistics, combine length, number of occurrences, similarity and keywords to create a YARA rule1. StatisticsFnord processes the file with a sliding window of varying size to extract all sequences of with a minimum length -m X (default: 4) up to a maximum length -x X (default: 40). For each length, Fnord will present the most frequently occurring sequences -t X (default: 3) in a table.Each…