PRINT
PRINT
SEND MAIL
SEND MAIL

Category: Bash

Windows10

Black Window 10 v2 (codename: Polemos)

Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system and…

Debian

Cerberus Linux v3

  Cerberus Linux v3  Cerberus is a penetration testing distribution focusing on automation and anonymity , it aims to have the best tools available on the hacking scene tools like Fuzzbunch, Dandespritz, Cobalt strike, Armitage, Metasploit framework and Metasploit community version set up and ready for use!! It includes custom scripts, custom themes, custom icons!Cerberus distribution is based on Debian testing, it has the capability to use 3 repositories to install packages from kali repo,Debian repo, and cyber sec repo! Cerberus is an Angry…

Windows Hacking

Black Window 10 Enterprise

Black Window 10 Enterprise is the first windows based penetration testing distribution with linux integraded ! The system comes activated with a digital license for windows enterprise ! It supports windows apps and linux apps, gui and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of cerberus linux! It has managed to implement cerberus os within windows.Offers the stability of a windows system and it offers the hacking part with a…

Antivirus EvasionArmorBashBash ScriptencryptedKaliNetcatNEW TOOLSRemote AccessScripts

Armor – Tool Designed To Create Encrypted macOS Payloads Capable Of Evading Antivirus Scanners

Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners. Below is an example gif of Armor being used with a simple Netcat payload.A Netcat listener is started on port 4444. The "payload.txt" file is read and shown to contain a simple Bash one-liner that, when executed, will create a TCP connection between the target MacBook at the attacker's Netcat listener. Armor is used to encrypt the bash one-liner. Ncat is used to host the decryption key…

BashBasharkNEW TOOLSPentestersPost Exploitation

Bashark – Bash Post Exploitation Toolkit

Bashark aids pentesters and security researchers during the post-exploitation phase of security audits.UsageTo launch Bashark on compromised host, simply source the bashark.sh script from terminal: $ source bashark.sh Then type help to see Bashark's help menuFeaturesSingle Bash scriptLightweight and fastMulti-platform: Unix, OSX, Solaris etc.No external dependenciesImmune to heuristic and behavioural analysisBuilt-in aliases of often used shell commandsExtends system shell with post-exploitation oriented functionalitiesStealthy, with custom cleanup routine activated on exitEasily extensible (add new commands by creating Bash functions)Full tab completionDemoDownload Bashark

BashBash ScriptDVR-ExploiterNEW TOOLS

DVR-Exploiter – Bash Script Program Exploit The DVR’s Based On CVE-2018-9995

DVR-Exploiter[*] Exploit Title: DVR Credentials Exposed [*] Date: 09/04/2018[*] Exploit Author: Fernandez Ezequiel[*] DVR-Exploiter By: Belahsan Ouerghi [*] Contact: www.facebook.com/ouerghi.belahsan[*] Youtube Tutorial: [*] Dorks: intitle:"DVR Login" html:"/login.rsp" "Server: GNU rsp/1.1"tested in DVR :NovoCeNovaQSeePulnixXVR 5 in 1 (title: "XVR Login")Securus, - Security. Never Compromise !! - Night OWLDVR LoginHVR LoginMDVR LoginInstallation :$ git clone cd DVR-Exploiter$ ./DVR-Exploiter.sDetails[ After Running Choose The Host Example : 1 = 127.0.0.1 {IP } , / 2 = www.xxxxxxxx.com ]Don't Forget To Install The Plugin Of The DVRScreenshotsDownload DVR-Exploiter

4NonimizerAnonymizingBashBash ScriptKaliKali LinuxNEW TOOLSPrivoxyTORTor Network

4Nonimizer – A Tol For Anonymizing The Public IP Used To Browsing Internet, Managing The Connection To TOR Network And To Different VPNs Providers

It is a bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs providers (OpenVPN), whether free or paid. By default, it includes several pre-configured VPN connections to different peers (.ovpn files) and download the credentials (if the corresponding provider support it). Also, it records each used IP that we use every 300 seconds in log files.This script is enabled as a service in systemd systems and uses a default vpn (VPNBook) at…

BashBlind BashNEW TOOLS

Blind Bash – Obfuscate And Protect Your Bash Code

You can use this tool to obfuscate your bash code. The obfuscation is the best way to hide important things in your code.This tool will give you blind & strong code , but everyone have knowledge in bash script can deobfuscate this code. So this obfuscation not %100 secure , don't let important things in your bash code just use this obfuscation for joking.For What ?The goal of this project is to make code hard to read by people with limited knowledge in BashFor…

AIXBashCommand LineCommandlineDistroInfo ScreenshotInformation ToolNeofetchNEW TOOLSTool

Neofetch – A Command-Line System Information Tool

Neofetch is a command-line system information tool written in bash 3.2+. Neofetch displays information about your operating system, software and hardware in an aesthetic and visually pleasing way.The overall purpose of Neofetch is to be used in screen-shots of your system. Neofetch shows the information other people want to see. There are other tools available for proper system statistic/diagnostics.The information by default is displayed alongside your operating system's logo. You can further configure Neofetch to instead use an image, a custom ASCII file, your…

BashDirtycowNEW TOOLSPE-Linuxpenetration testingPrivilege EscalationPrivilege Escalation Exploits

PE Linux – Linux Privilege Escalation Tool

New Linux Privilege Escalation Tool.Getting StartedSystem Information GathererKernel Information GathererChecking Development environments on the system (Escaping Restricted Shells)Extract PATH & environment InformationCheck Kernel if Vulnerable To Dirty cow ExploitPassword CollectorLog Analyzer For interesting InformationCheck Password PolicyDatabase Password CollectorCheck If SSH Are Allowed With RootChecking For interesting Root,Home,Var Directory FilesRSA Key's CollectorCommand History AnalyzerUsers Enumeration (Root - Sudo - UID List - GID List)Cron Jobs Enumeration (Permissions - Own Cron - Cron Content - Writable Cron)Network Information Lookup (TCP Connections - ARP - Services)List Are…

BashNEW TOOLSReverse TCP PayloadUnix

Autopwn v2.0 – A Simple Bash Based Metasploit Automation Tool

A simple bash based metasploit automation tool!With just a few clicks, own any android or windows device!!Update:Changed the name from Autopreter to Autopwn™System-wide installation (just enter Autopwn in the terminal from any directory!!)Added eternalblue exploitPrerequisitesMetasploit frameworkA linux/unix based systemngrok Please note that ngrok is not not a necessity and is required only for performing over the internet (WAN) attack!Installationchmod +x Autopwn.sh./Autopwn.shFuture UpdatesMore exploits to be addedWindows host support to be added soonDownload Autopwn