PRINT
PRINT
SEND MAIL
SEND MAIL
Windows10

Black Window 10 v2 (codename: Polemos)

Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system and…

Debian

Cerberus Linux v3

  Cerberus Linux v3  Cerberus is a penetration testing distribution focusing on automation and anonymity , it aims to have the best tools available on the hacking scene tools like Fuzzbunch, Dandespritz, Cobalt strike, Armitage, Metasploit framework and Metasploit community version set up and ready for use!! It includes custom scripts, custom themes, custom icons!Cerberus distribution is based on Debian testing, it has the capability to use 3 repositories to install packages from kali repo,Debian repo, and cyber sec repo! Cerberus is an Angry…

Windows Hacking

Black Window 10 Enterprise

Black Window 10 Enterprise is the first windows based penetration testing distribution with linux integraded ! The system comes activated with a digital license for windows enterprise ! It supports windows apps and linux apps, gui and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of cerberus linux! It has managed to implement cerberus os within windows.Offers the stability of a windows system and it offers the hacking part with a…

Debian

Cerberus Linux v3

  Cerberus Linux v3  Cerberus is a penetration testing distribution focusing on automation and anonymity , it aims to have the best tools available on the hacking scene tools like Fuzzbunch, Dandespritz, Cobalt strike, Armitage, Metasploit framework and Metasploit community version set up and ready for use!! It includes custom scripts, custom themes, custom icons!Cerberus distribution is based on Debian testing, it has the capability to use 3 repositories to install packages from kali repo,Debian repo, and cyber sec repo! Cerberus is an Angry…

Windows Hacking

Black Window 10 Enterprise

Black Window 10 Enterprise is the first windows based penetration testing distribution with linux integraded ! The system comes activated with a digital license for windows enterprise ! It supports windows apps and linux apps, gui and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of cerberus linux! It has managed to implement cerberus os within windows.Offers the stability of a windows system and it offers the hacking part with a…

penetration testingTUTORIALS

Socks Proxy Penetration Lab Setup using Microsocks

Hello friends!! In our previous article we have disccuss “Web Proxy Penetration Lab Setup Testing using Squid” and today’s article we are going to setup SOCKS Proxy to use it as a Proxy Server on Ubuntu/Debian machines and will try to penetrate it. Table of Content Intoduction to proxy What is socks proxy Difference Between Socks proxy and HTTP Proxy Socks proxy Installation Web Proxy Penetration Testing SSH Proxy Penetration Testing FTP Proxy Penetration Testing Intoduction to Proxy A proxy is a computer system…

Command LineDeepSearchNEW TOOLSPython3WebscannerWordlist

DeepSearch – Advanced Web Dir Scanner

DeepSearch is a simple command line tool for bruteforce directories and files in websites.Installation$ git clone deepsearch$ cd deepsearch $ pip3 install requests$ python3 deepsearch.pyScreenshotsUsageBasic:python3 deepsearch.py -u -e php -w wordlist.txtForce extension for every wordlist entry (support one extension):python3 deepsearch.py -u -e php -w wordlist.txt -fMake a request by hostname (ip):python3 deepsearch.py -u -e php -w wordlist.txt -bForce lowercase for every wordlist entry:python3 deepsearch.py -u -e php -w wordlist.txt -lForce uppercase for every wordlist entry:python3 deepsearch.py -u -e…

penetration testingTUTORIALS

Web Proxy Penetration Lab Setup Testing using Squid

In this article we are going to setup Squid to use it as a Proxy Server on Ubuntu/Debian machines and will try to penetrate it. Table of content Introduction to Proxy Setting Squid Proxy Installation Squid Proxy Server Configuration Configuring Apache service for Web Proxy Web Proxy Penetration Testing Directory Brute force Attack on Proxy Server Using DIRB Tool Vulnerability Scanning on Proxy Server Using Nikto Tool SQL Injection on Proxy Server Using Sqlmap Tool WordPress Scanning on Proxy Server Using WPScan Tool Introduction…

NEW TOOLSOsmedeusPort ScanningSubdomain Takeover

Osmedeus – Automatic Reconnaisance And Scanning In Penetration Testing

Automatic Reconnaisance and Scanning in Penetration TestingWhat is Osmedeus?Osmedeus allow you to doing boring stuff in Pentesting automatically like reconnaissance and scanning the target by run the collection of awesome tools.Installationgit clone Osmedeuschmod +x install.sh./install.shHow to useDoing normal routine include: Subdomain Scanning, Subdomain TakeOver Scanning, Port Scanning and ScreenShot the target../osmedeus.py -t example.comScanning subdomain and Subdomain TakeOver./osmedeus.py -m subdomain -t example.comGit repo scanning./osmedeus.py -m git --git some stuff with Burp State file./osmedeus.py -m burp -t example.com --burp yourburpstate.xmlAvailable modules with list tool…

Electronic PaymentsFeaturedFinancial malwareMalware StatisticsPublicationsSecurity FeedsTrojan BankerZeuS

Black Friday alert

Banking Trojans traditionally target users of online financial services; looking for financial data to steal or building botnets out of hacked devices for future attacks. However, over time, several of these banking Trojans have enhanced their functionality, launching new variants and extending their range. Some are now able to obtain root access to infected devices, perform transactions, inject other malicious code, record video, and more. And the victims of such malware are not just people who bank online but online shoppers in general. According…

BabySploitBeginner FriendlyEthical HackingNEW TOOLSpenetration testingPenetration Testing FrameworkPentest ToolPython3Testing Framework

BabySploit – BabySplot Beginner Pentesting Framework

Tested on Kali Linux. Should work with all Debian based distros (and other ones if you have the right packages installed)BabySploit is a penetration testing framework aimed at making it easy to learn how to use bigger, more complicated frameworks like Metasploit. With a very easy to use UI and toolkit, anybody from any experience level will find use out of BabySploit.Features (Current, In The Works, Planned):Information GatheringExploitationPost ExploitationBruteforcingPhishingCryptography/StenographyInformation Gathering:NmapIP InfoTcpdump (In The Works)Datasploit (In The Works)Censys LookupDNS LookupExploitation:SearchsploitReverseShell WizardPost Exploitation:In The WorksBruteforcing:In The…

Hacking Toolspenetration testingTUTORIALS

Comprehensive Guide on Medusa – A Brute Forcing Tool

Hello friends!! Today we are going to discuss – How much impactful Medusa is in cracking login credential of various protocols to make unauthorized access to a system remotely. In this article we have discussed each option available in Medusa to make brute force attack in various scenario.  Table OF Content Introduction to Medusa and its features Password Cracking For Specific Username Username Cracking for Specific Password Cracking Login Credential Making Brute Force Attack on Multiple Host Attacking on Specific Port Instead of Default…

Binary AnalysisCommand LineManticoreNEW TOOLSProgram AnalysisPython3SoliditySymbolic Execution

Manticore – Symbolic Execution Tool For Analysis Of Binaries And Smart Contracts

Manticore is a symbolic execution tool for analysis of binaries and smart contracts.Note: Beginning with version 0.2.0, Python 3.6+ is required.FeaturesInput Generation: Manticore automatically generates inputs that trigger unique code pathsCrash Discovery: Manticore discovers inputs that crash programs via memory safety violationsExecution Tracing: Manticore records an instruction-level trace of execution for each generated inputProgrammatic Interface: Manticore exposes programmatic access to its analysis engine via a Python APIManticore can analyze the following types of programs:Ethereum smart contracts (EVM bytecode)Linux ELF binaries (x86, x86_64 and ARMv7)UsageCLIManticore…

EXPLOIT-COLLECTORHome

Eraser – Windows Secure Erase Hard Drive Wiper

Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Eraser is a Windows focused hard drive wiper and is currently supported under Windows XP (with Service Pack 3), Windows Server 2003 (with Service Pack 2), Windows Vista, Windows Server 2008, Windows 7,8 ,10 and Windows Server 2012. Read the rest of Eraser – Windows Secure Erase Hard Drive Wiper…