PRINT
PRINT
SEND MAIL
SEND MAIL

Category: NEW TOOLS

NEW TOOLS

Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email cybersec@cybeseclabs.com then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

BscanInformation GatheringKali LinuxNEW TOOLSNmapRegular ExpressionsScanUnicornscanWordlistWordlists

Bscan – An Asynchronous Target Enumeration Tool

Synopsisbscan is a command-line utility to perform active information gathering and service enumeration. At its core, bscan asynchronously spawns processes of well-known scanning utilities, repurposing scan results into highlighted console output and a well-defined directory structure.Installationbscan was written to be run on Kali Linux, but there is nothing inherently preventing it from running on any OS with the appropriate tools installed.Download the latest packaged version from PyPI:pip install bscanOr get the bleeding-edge version from version control:pip install Usagebscan has a wide variety of…

BincatCode AnalysisIDA PluginIDA ProNEW TOOLS

Bincat – Binary Code Static Analyser, With IDA Integration

BinCAT is a static Binary Code Analysis Toolkit, designed to help reverse engineers, directly from IDA.It features:value analysis (registers and memory)taint analysistype reconstruction and propagationbackward and forward analysisuse-after-free and double-free detectionIn actionYou can check (an older version of) BinCAT in action here:Basic analysisUsing data taintingCheck the tutorial out to see the corresponding tasks.Quick FAQSupported host platforms:IDA plugin: all, version 6.9 or later (BinCAT uses PyQt, not PySide)analyzer (local or remote): Linux, Windows, macOS (maybe)Supported CPU for analysis (for now):x86-32ARMv7ARMv8PowerPCInstallationOnly IDA v6.9 or later (7…

FnordHex EditorMacNEW TOOLSRegular ExpressionsYarayarGen

Fnord – Pattern Extractor For Obfuscated Code

Fnord is a pattern extractor for obfuscated codeDescriptionFnord has two main functions:Extract byte sequences and create some statisticsUse these statistics, combine length, number of occurrences, similarity and keywords to create a YARA rule1. StatisticsFnord processes the file with a sliding window of varying size to extract all sequences of with a minimum length -m X (default: 4) up to a maximum length -x X (default: 40). For each length, Fnord will present the most frequently occurring sequences -t X (default: 3) in a table.Each…

Netsniff-NgNEW TOOLSPacket CapturePacket GeneratorPacket SnifferSniffingSwiss Army Knife

Netsniff-Ng – A Swiss Army Knife For Your Daily Linux Network Plumbing

netsniff-ng is a free Linux networking toolkit, a Swiss army knife for your daily Linux network plumbing if you will.Its gain of performance is reached by zero-copy mechanisms, so that on packet reception and transmission the kernel does not need to copy packets from kernel space to user space and vice versa.Our toolkit can be used for network development and analysis, debugging, auditing or network reconnaissance.The netsniff-ng toolkit consists of the following utilities:netsniff-ng, a fast zero-copy analyzer, pcap capturing and replaying tooltrafgen, a multithreaded…

fwknopMacNEW TOOLSPacket AuthorizationPort KnockerPort KnockingScanSniffingSpoofingTORZero Trust

Fwknop – Single Packet Authorization & Port Knocking

fwknop implements an authorization scheme known as Single Packet Authorization (SPA) for strong service concealment. SPA requires only a single packet which is encrypted, non-replayable, and authenticated via an HMAC in order to communicate desired access to a service that is hidden behind a firewall in a default-drop filtering stance. The main application of SPA is to use a firewall to drop all attempts to connect to services such as SSH in order to make the exploitation of vulnerabilities (both 0-day and unpatched code)…

2FA AuthenticationCommand LineJavaScriptMITMModlishkaNEW TOOLSParameterTLS

Modlishka – An Open Source Phishing Tool With 2FA Authentication

Modlishka is a flexible and powerful reverse proxy, that will take your phishing campaigns to the next level (with minimal effort required from your side).Enjoy :-)FeaturesSome of the most important 'Modlishka' features :Support for majority of 2FA authentication schemes (by design).No website templates (just point Modlishka to the target domain - in most cases, it will be handled automatically).Full control of "cross" origin TLS traffic flow from your victims browsers.Flexible and easily configurable phishing scenarios through configuration options.Pattern based JavaScript payload injection.Striping website from…

Anti-PatternsElectron AppElectronegativityMacMisconfigurationsNEW TOOLSNodeNodeJS

Electronegativity – Tool To Identify Misconfigurations And Security Anti-Patterns In Electron Applications

Electronegativity is a tool to identify misconfigurations and security anti-patterns in Electron-based applications.It leverages AST and DOM parsing to look for security-relevant configurations, as described in the "Electron Security Checklist - A Guide for Developers and Auditors" whitepaper.Software developers and security auditors can use this tool to detect and mitigate potential weaknesses and implementation bugs when developing applications using Electron. A good understanding of Electron (in)security is still required when using Electronegativity, as some of the potential issues detected by the tool require manual…

BlueteamLiving Off The LandLOLBASLOLBinLOLLibLOLScriptNEW TOOLSPurpleteamRedteam

LOLBAS – Living Off The Land Binaries And Scripts (LOLBins And LOLScripts)

The goal of the LOLBAS project is to document every binary, script, and library that can be used for Living Off The Land techniques.All the different files can be found behind a fancy frontend here: ;(thanks @ConsciousHacker for this bit of eyecandy and the team over at ). This repo serves as a place where we maintain the YML files that are used by the fancy frontend.CriteriaA LOLBin/Lib/Script must:Be a Microsoft-signed file, either native to the OS or downloaded from Microsoft.Have extra "unexpected" functionality. It is not interesting…