PRINT
PRINT
SEND MAIL
SEND MAIL

Author: D4RkN

NEW TOOLS

Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email cybersec@cybeseclabs.com then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

TUTORIALS

How to install Black Window Enterprise!

Before we start with the installation, things you need to know: with any donation for Black Window v1 you will get those files: Windows 10 Enterprise Key txt file 2 Zip files with Extra Windows ( GUI ) Hacking Tools (1.4 gigabytes) 2 Official Windows 10 Enterprise Iso files 64 bit and 86 bit 2 zip files Black Window 10 Enterprise Codename: Arachni ( 21 gigabytes) the Black Window zip files are password protected, the password will be sent to your email with your…

Windows Hacking

Black Window 10 Enterprise

Black Window 10 Enterprise is the first windows based penetration testing distribution with linux integraded ! The system comes activated with a digital license for windows enterprise ! It supports windows apps and linux apps, gui and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of cerberus linux! It has managed to implement cerberus os within windows.Offers the stability of a windows system and it offers the hacking part with a…

Cyber Threats

Anonymous greece answer to turk’s cyber attack’s!

Some drama has been circulating the media between Turkey and Greece with the recent “Hagia Sofia incident”. In response to the spectacle, a Turkish hacking group (Aslan Neferler Tim) retaliated by targeting the Greek Prime Minister’s webpage. The hacking group released a statement with the attack: “The duty is ours to answer to the Greek reaction to the prayer in Hagia Sofia. Tsipras do not be surprised, do not make us lose our patience.” Of course, OP Anonymous Greece retaliated almost immediately. If you navigate to…

Security Feeds

GandCrab v3 Ransomware on the wild!

This is the new Ransomware virus that engrypts your files , it creates a file called CRAB-DECRYPT on any egrypted directory with the following message : ---= GANDCRAB V3 =--- Attention! All your files documents, photos, databases and other important files are encrypted and have the extension: .CRAB The only method of recovering files is to purchase a private key. It is on our server and only we can recover your files. The server with your key is in a closed network TOR. You can get…

TUTORIALS

How to Create a Virtual Hacking Lab

Download VMware Workstation or Player The best way to practice hacking is within a virtual environment. Essentially, you set up a hacking system, such as Kali Linux, and some victims to exploit. Ideally, you would want multiple operating systems (Windows XP, Vista, 7, and 8, as well as a Linux flavor) and applications so that you can try out a variety of hacks. Virtual machines and a virtual network are the best and safest way to set up a hacking lab. There are several virtualization systems out…

TUTORIALS

How to Hack Web Browsers with BeEF

Start Cooking BeEF BeEF is built into Kali Linux, and it can be started as a service and accessed via a web browser on your localhost. So let's start by firing up Kali and cooking a bit of BeEF. Start the BeEF service by going to "Applications" -> "Kali Linux" -> "System Services" -> "BeEF" -> "beef start." Step 2Opening a Browser to BeEF The BeEF server can be accessed via any browser on our localhost (127.0.0.1) web server at port 3000. To access its…

TUTORIALS

Exploit Pack: Using Windows as a Hacking Platform

Download & Install Java The first step, of course, is to download and install Exploit Pack. As I mentioned above, it is written in Java, so it is requisite that you have Java 8 installed. You can go to Oracle's website and download Java 8 for your architecture. Since I will be working on a 64-bit Windows 7 system, I downloaded the Windows x64 Java, as circled in the screenshot below. Of course, if you are using a different architecture, make certain to download the Java…

TUTORIALS

How to Find the Exact Location of Any IP Address

Fire Up Kali & Open a Terminal The first step, of course, is to fire up our our trusty Kali system, or in this case, any Linux distribution. Then, open a terminal. Note: Be cautious of the formatting below for commands. The formatting of this article will create big space gaps since it stretches lines out to fit the margins. This is because of long URLs that try to fit themselves on a separate line. Large spaces equals just one space, so keep that in mind. Refer…

DownloadsUbuntu

NetReaper 4.3 Free Downloads!

  NetReaper  (based on Panto 4.3) NetReaper Linux  (Nethunter) is a penetration testing and security assessment oriented Linux distribution focusing on wireless hacking and anonymity , providing a network and systems analysis toolkit. It includes some of the most commonly known/used security and analysis tools,it includes over 30 new wifi tools to automate wireless hacking ,it aims to crack wifi vulnerable networks in 2 seconds , aiming for a wide spread of goals, ranging from web application analysis to network analysis, stress tests, sniffing,…