Month: May 2018


Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  


Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

APTAPT reportsCyberespionageFeaturedGoogle AndroidMalware DescriptionsSecurity FeedsWatering hole attacks

Who’s who in the Zoo

ZooPark is a cyberespionage operation that has been focusing on Middle Eastern targets since at least June 2015. The threat actors behind the operation infect Android devices using several generations of malware, with the attackers including new features in each iteration. We label them from v1-v4, with v4 being the most recent version deployed in 2017. From the technical point of view, the evolution of ZooPark has shown notable progress: from the very basic first and second versions, the commercial spyware fork in its…

DistroKaliKali LinuxNEW TOOLSPenetration Testing DistributionPentesting Distribution

Kali Linux 2018.2 Release – The Best Penetration Testing Distribution

This Kali release is the first to include the Linux 4.15 kernel, which includes the x86 and x64 fixes for the much-hyped Spectre and Meltdown vulnerabilities. It also includes much better support for AMD GPUs and support for AMD Secure Encrypted Virtualization, which allows for encrypting virtual machine memory such that even the hypervisor can’t access it.Easier Metasploit Script AccessIf you spend any significant amount of time writing exploits, you are undoubtedly familiar with the various Metasploit scripts that are available, such as pattern_create,…

Monitoring ApplicationMonitoring ServerMonitoring SystemsMonitoring ToolNagiosNEW TOOLSNode.jsPython3Raspberry PiYamot

Yamot – Yet Another MOnitoring Tool

yamot is a web-based server-monitoring tool built for small environments with just a handful servers. It takes a minimum of resources which allows the execution on almost every machine, also very old ones. It works best with Linux or BSD. Windows is not part of the server scope.You could use it for example to monitor your Raspberry Pi Servers running at home. It takes only a few steps of configuration and after that it displays much relevant server measurement data in your browser:System LoadMemory…

BitbucketDebianEmailsGitHubGitlabGitmailsGoHarvesterInformation GatheringMacNEW TOOLSPython3Version control

Gitmails – An Information Gathering Tool To Colect Git Commit Emails In Version Control Host Services

An information gathering tool to colect git commit emails in version control host services.OverviewGitmails explores that git commits contains a name and an email configured by the author and that version control host services are being used to store a lot of projects.What Gitmails does is:Query the version control host services for information about an organization, team, group, user or single repository;List all repositories (restricted by authentication) if not on single repository mode;Clone the repository or query the version control host service for the…


Hack the Box Challenge: Inception Walkthrough

Hello friends!! Today we are going to solve another challenge “Inception” which is categories as retired lab presented by Hack the Box for making online penetration practices. Solving challenges in this lab is not that much easy, you have to use your entire Penetration testing skills. Let start and learn how to breach a network and then exploit it for retrieving desired information. Level: Hard Task: find user.txt and root.txt file on victim’s machine. Since these labs are online accessible therefore they have static IP. The IP of Inception is so let’s start…

Drupaldrupal securityEXPLOIT-COLLECTORHacking ToolsHome

Drupwn – Drupal Enumeration Tool & Security Scanner

Drupwn is a Python-based Drupal Enumeration Tool that also includes an exploit mode, which can check for and exploit relevant CVEs. Drupwn Drupal Enumeration Tool Hacking Features Drupwn can be run, using two separate modes which are enum and exploit. The enum mode allows performing enumerations whereas the exploit mode allows checking and exploiting CVEs. Enum mode User enumeration Node enumeration Default files enumeration Module enumeration Theme enumeration Cookies support User-Agent support Basic authentication support Request delay Enumeration range Logging Exploit mode Vulnerability checker…

API ScannerDynamic TestingEaSTInformation DisclosureNEW TOOLSSecurity AssessmentSecurity Assessment ToolSQLsql injectionSQLiStatic AnalysisWSSATXXE Injection

WSSAT v2.0 – Web Service Security Assessment Tool

WSSAT is an open source web service security scanning tool which provides a dynamic environment to add, update or delete vulnerabilities by just editing its configuration files. This tool accepts WSDL address list as input file and for each service, it performs both static and dynamic tests against the security vulnerabilities. It also makes information disclosure controls. With this tool, all web services could be analysed at once and the overall security assessment could be seen by the organization.Objectives of WSSAT are to allow…