Category: Command Line


Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  


Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

2FA AuthenticationCommand LineJavaScriptMITMModlishkaNEW TOOLSParameterTLS

Modlishka – An Open Source Phishing Tool With 2FA Authentication

Modlishka is a flexible and powerful reverse proxy, that will take your phishing campaigns to the next level (with minimal effort required from your side).Enjoy :-)FeaturesSome of the most important 'Modlishka' features :Support for majority of 2FA authentication schemes (by design).No website templates (just point Modlishka to the target domain - in most cases, it will be handled automatically).Full control of "cross" origin TLS traffic flow from your victims browsers.Flexible and easily configurable phishing scenarios through configuration options.Pattern based JavaScript payload injection.Striping website from…

Command LineIncident responseIntrusion DetectionNEW TOOLSPacket CaptureStenographer

Stenographer – A Packet Capture Solution Which Aims To Quickly Spool All Packets To Disk, Then Provide Simple, Fast Access To Subsets Of Those Packets

Stenographer is a full-packet-capture utility for buffering packets to disk for intrusion detection and incident response purposes. It provides a high-performance implementation of NIC-to-disk packet writing, handles deleting those files as disk fills up, and provides methods for reading back specific sets of packets quickly and easily.It is designed to:Write packets to disk, very quickly (~10Gbps on multi-core, multi-disk machines)Store as much history as it can (managing disk usage, storing longer durations when traffic slows, then deleting the oldest packets when it hits disk…

CensysCommand LineFramework ExploitationMetasploit FrameworkNEW TOOLSRemote Code ExecutionRubySecurity ToolsShells

AutoSploit v3.0 – Automated Mass Exploiter

As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through Shodan, Censys or Zoomeye. But options to add your custom targets and host lists have been included as well. The available Metasploit modules have been selected to facilitate Remote Code Execution and to attempt to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, local host and local port for MSF facilitated back connections are configured by filling out the dialog that comes up before…

Command LineExrexMacNEW TOOLSRegular Expressions

Exrex – Irregular Methods On Regular Expressions

Exrex is a command line tool and python module that generates all - or random - matching strings to a given regular expression and more. It's pure python, without external dependencies.There are regular expressions with infinite matching strings (eg.: [a-z]+), in these cases exrex limits the maximum length of the infinite parts.Exrex uses generators, so the memory usage does not depend on the number of matching strings.FeaturesGenerating all matching stringsGenerating a random matching stringCounting the number of matching stringsSimplification of regular expressionsInstallationTo install exrex,…

BeEFCommand LineJavaScriptJS ShellJSShellMacNEW TOOLSRemote Code Execution

JSShell – An Interactive Multi-User Web JS Shell

An interactive multi-user web based javascript shell. It was initially created in order to debug remote esoteric browsers during experiments and research. This tool can be easily attached to XSS (Cross Site Scripting) payload to achieve browser remote code execution (similar to the BeeF framework).Version 2.0 is created entirely from scratch, introducing new exciting features, stability and maintainability.AuthorDaniel Abeles.Shell VideoFeaturesMulti client supportCyclic DOM objects supportPre flight scriptsCommand Queue & ContextExtensible with PluginsInjectable via <script> tagsDumping command output to fileShell paginationInstallation & SetupConfig FileIn the…

Command LineCuteitIP addressIP ObfuscatorLan AttacksLan NetworkMacNEW TOOLS

Cuteit – Make A Malicious IP A Bit Cuter (IP Obfuscator)

A simple python tool to help you to social engineer, bypass whitelisting firewalls, potentially break regex rules for command line logging looking for IP addresses and obfuscate cleartext strings to C2 locations within the payload.All of that is simply done with obfuscating ip to many forms.Download Cuteit

BIOSCommand LineGNUMCExtractorMicrocode Extraction ToolNEW TOOLSParameterReportingScan

MCExtractor – Intel, AMD, VIA & Freescale Microcode Extraction Tool

Intel, AMD, VIA & Freescale Microcode Extraction ToolMC Extractor News FeedMC Extractor Discussion TopicIntel, AMD & VIA CPU Microcode RepositoriesA. About MC ExtractorMC Extractor is a tool which parses Intel, AMD, VIA and Freescale processor microcode binaries. It can be used by end-users who are looking for all relevant microcode information such as CPUID, Platform, Version, Date, Release, Size, Checksum etc. It is capable of converting Intel microcode containers (dat, inc, h, txt) to binary images for BIOS integration, detecting new/unknown microcodes, checking microcode…

Code AnalysisCode ReviewCommand LineJavaScriptMacNEW TOOLSNodeNode SecurityNode.jsNodeJSNodeJsScanSecurity ScannerStatic Analysis

NodeJsScan – A Static Security Code Scanner For Node.js Applications

Static security code scanner (SAST) for Node.js applications.Configure & Run NodeJsScanInstall Postgres and configure SQLALCHEMY_DATABASE_URI in core/settings.pypip3 install -r requirements.txtpython3 # Run once to create database entries requiredpython3 # Testing Environmentgunicorn -b app:app # Production EnvironmentThis will run NodeJsScan on you need to debug, set DEBUG = True in core/settings.pyNodeJsScan CLIThe command line interface (CLI) allows you to integrate NodeJsScan with DevSecOps CI/CD pipelines. The results are in JSON format. When you use CLI the results are never stored with…

Command LineDeepSearchNEW TOOLSPython3WebscannerWordlist

DeepSearch – Advanced Web Dir Scanner

DeepSearch is a simple command line tool for bruteforce directories and files in websites.Installation$ git clone deepsearch$ cd deepsearch $ pip3 install requests$ python3 deepsearch.pyScreenshotsUsageBasic:python3 -u -e php -w wordlist.txtForce extension for every wordlist entry (support one extension):python3 -u -e php -w wordlist.txt -fMake a request by hostname (ip):python3 -u -e php -w wordlist.txt -bForce lowercase for every wordlist entry:python3 -u -e php -w wordlist.txt -lForce uppercase for every wordlist entry:python3 -u -e…