PRINT
PRINT
SEND MAIL
SEND MAIL

Category: Hacking Tools

NEW TOOLS

Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email cybersec@cybeseclabs.com then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

EXPLOIT-COLLECTORHacking ToolsHome

BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy

BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads (software updates for example) from vendors that don’t validate data integrity. The Backdoor Factory allows you to patch binaries with shell-code so combining that with mitmproxy, which is a Python proxy-server that can catch HTTP, change traffic on the fly, replay traffic, decode and render primitive data types – gives you BDFProxy. Read the rest of BDFProxy – Patch Binaries via…

Hacking Toolspenetration testingTUTORIALS

GreatSct – An Application Whitelist Bypass Tool

While writing Applocker bypass series, we found a new tool which was especially designed for bypassing whitelisting application.  So I Decided to write this article where we are introducing another most interesting tool “Great SCT –A Metasploit payload generator” tool which is similar to Unicorn or msfvenom because it depends on the metasploit framework to provide reverse connection of the victim’s machine. So let’s began with its tutorial and check its functionality. Table of Content GreatSCT Installation & Usages Generate malicious hta file Generate…

EXPLOIT-COLLECTORHacking ToolsHome

Domained – Multi Tool Subdomain Enumeration

Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains that are passed to EyeWitness for reporting. This produces categorized screenshots, server response headers and signature based default credential checking. It is written in Python heavily leveraging Recon-ng. Domains Subdomain Enumeration Tools Leveraged Subdomain Enumeraton Tools: Sublist3r enumall Knock Subbrute massdns Recon-ng Amass SubFinder Reporting + Wordlists: EyeWitness SecList (DNS Recon List) LevelUp All.txt Subdomain List Domained Subdomain Enumeration Tool Usage…

Hacking Toolspenetration testingTUTORIALS

Penetration Testing on Group Policy Preferences

Hello Friends!! You might be aware of Group Policy Preferences in Windows Server 2008 that allows system administrators to set up specific configurations. It can be used to create username and encrypted password on machines. But do you know, that a normal user can elevate privilege to local administrator and probably compromise the security of the entire domain because passwords in preference items are not secured. Table of Content What is Group Policy Preferences? Why using GPP to create a user account is a…

Hacking Toolspenetration testingTUTORIALS

Exploiting Jenkins Groovy Script Console in Multiple Ways

Hello Friends!! There were so many possibilities to exploit Jenikins however we were interested in Script Console because Jenkins has lovely Groovy script console that permits anyone to run arbitrary Groovy scripts inside the Jenkins master runtime. Table of Content Jenkin’s Groovy Script Console Metasploit groovy Groovy executing shell commands -I Groovy executing shell commands -II Jenkin’s Groovy Script Console Jenkins features a nice Groovy script console which allows one to run arbitrary Groovy scripts within the Jenkins master runtime or in the runtime…

Hacking Toolspenetration testingTUTORIALS

A Little Guide to SMB Enumeration

Enumeration is very essential phase of Penetration testing, because when a pentester established active connection with victim, then he try to retrieve as much as possible information of victim’s machine, which could be useful to exploit further. In this article, we had explore SMB enumeration using Kali Linux inbuilt command-line tools only. Table of Content Nmblookup nbtscan SMBMap Smbclient Rpcclient Nmap Enum4linux nmblookup nmblookup is used to query NetBIOS names and map them to IP addresses in a network using NetBIOS over TCP/IP queries.…

Hacking ToolsKali Linuxpenetration testingTUTORIALS

Defend against Brute Force Attack with Fail2ban

Daily we hear some news related to cybercrime just, like, some malicious users or bots has successfully defaced some publicly accessible website or some services. As we always try to explain through our articles, how such types of activities are possible when system is weak configured or misconfigured. Therefore, it is important to build some security measures such as IDS/IPS within firewall to defend your server and clients while configuring it. In this article we will show, how you can protect your network from…

Hacking Toolspenetration testingTUTORIALS

Comprehensive Guide on Dymerge

Hello friends! This article is comprehensive guide on the Dymerge tool. This is a handy little tool that helps you manage all the dictionaries that you’ve created reading through our blog and using all the amazing tools we’ve written about. Table of Content What is Dymerge Installing and Launching Dymerge Standard Merge Fast Mode Removing Duplicates Reverse Listing Alphabetic and Numeric Sorting Defining Output Including Characters Compressing Output Introduction to Dymerge Dymerge is a tool that gives you the ability to manage dictionaries. By…

Hacking Toolspenetration testingTUTORIALS

Comprehensive Guide on Dirbuster Tool

In this article, we are focusing on transient directory using Kali Linux tool Dibuster and trying to find hidden files and directories within a web server. Table of Content What is DirBuster Default Mode GET Request Method Pure Brute Force (Numeric) Single Sweep (Non-recursive) Targeted Start Blank Extensions Search by File Type (.txt) Changing DIR List Following Redirects Attack Through Proxy Adding File Extensions Evading Detective Measures (Requests Per Second) What is DirBuster DirBuster is an application within the Kali arsenal that is designed…