PRINT
PRINT
SEND MAIL
SEND MAIL

Category: Sniffing

Windows10

Black Window 10 v2 (codename: Polemos)

Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system and…

Debian

Cerberus Linux v3

  Cerberus Linux v3  Cerberus is a penetration testing distribution focusing on automation and anonymity , it aims to have the best tools available on the hacking scene tools like Fuzzbunch, Dandespritz, Cobalt strike, Armitage, Metasploit framework and Metasploit community version set up and ready for use!! It includes custom scripts, custom themes, custom icons!Cerberus distribution is based on Debian testing, it has the capability to use 3 repositories to install packages from kali repo,Debian repo, and cyber sec repo! Cerberus is an Angry…

Windows Hacking

Black Window 10 Enterprise

Black Window 10 Enterprise is the first windows based penetration testing distribution with linux integraded ! The system comes activated with a digital license for windows enterprise ! It supports windows apps and linux apps, gui and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of cerberus linux! It has managed to implement cerberus os within windows.Offers the stability of a windows system and it offers the hacking part with a…

DHCPEthernetEttercapLibPCAPMacMan-in-the-MiddleMITMNEW TOOLSScanSniffingSSHSSLstrip

Ettercap – A Comprehensive Suite For Man In The Middle Attacks

Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.ETTERCAP OFFERS THREE INTERFACES, TRADITIONAL COMMAND LINE, GUI AND NCURSES.Supported DistributionsThese distributions have been tested in both 32 and 64 bit flavors where possibleDebian/Ubuntu (Includes derivatives such as Kali, BackTrack, Mint, etc)FedoraGentooPentooMac OSX (Snow Leopard & Lion)FreeBSDOpenBSDNetBSDUnsupported DistributionsInstallation may work…

KillerBeeLibPCAPNEW TOOLSPacket CapturePacket InjectionPcapScapyScriptsSnifferSniffing

KillerBee – IEEE 802.15.4/ZigBee Security Research Toolkit

This is KillerBee - Framework and Tools for Attacking ZigBee and IEEE 802.15.4 networks.REQUIREMENTSKillerBee is developed and tested on Linux systems. OS X usage is possible but not supported.We have striven to use a minimum number of software dependencies, however, it is necessary to install the following Python modules before installation:serialusbcrypto (for some functions)pygtk (for use of tools that have GUIs)cairo (for use of tools that have GUIs)scapy (for some tools which utilize 802.15.4 Scapy extensions)On Ubuntu systems, you can install the needed dependencies…

MacNEW TOOLSSniffingTP-LINKTP-Link-defaults

TP-Link-defaults – Python Script For Trying Default Passwords For Some TP-Link Hotspots

Python script for trying default passwords for some TP-Link HotspotsInspired by Usageusage: scan.py [-h] [-p]Python script for trying default passwords for some TP-Link Hotspotsoptional arguments: -h, --help show this help message and exit -p, --print-all print all found ssid'sFOR EDUCATIONAL USE ONLYConfigtimeout stop sniffing after a given timeprint_all print all found ssid'sDownload TP-Link-defaults

CrawlingDiscoveryFile SharingFileshareMacNetwork AnalysisNEW TOOLSNmapNmap ScriptsScanSharesnifferSnifferSniffing

Sharesniffer – Network Share Sniffer And Auto-Mounter For Crawling Remote File Systems

sharesniffer is a network analysis tool for finding open and closed file shares on your local network. It includes auto-network discovery and auto-mounting of any open cifs and nfs shares.How to useExample to find all hosts in 192.168.56.0/24 network and auto-mount at /mnt:python sniffshares.py -l 4 --hosts 192.168.56.0/24 -a -m /mntRequirementsPython 2.7 or 3.5Linux or macOSNmap in PATHNmap scripts (.nse) in PATH (on Linux/macOS they are usually in /usr/local/share/nmap/), if you don't have the ones required are also in the rootdir of sharesniffer.python-nmap…

AircrackAirodump-ngAirpydumpMacNEW TOOLSSniffing

Airpydump – Analyze Wireless Packets On The Fly. Currently Supporting Three Working Modes (Reader, Live, Stealth)

Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)Descriptionairpydump is a wireless packet analyzer, providing the interface most likely that of airodump-ng from aircrack suite. It currently provides three working modes which are Reader, Stealth and Live. Reader Mode is used to read a written captured file earlier either with airodump, wireshark or airpydump itself. Stealth mode is used when you are on a run and don't want to see the live traffic but just on the end of…

Information discoveryIntrusion DetectionIntrusion PreventionInvoke-ATTACKAPIMitreMitre Attack DBNEW TOOLSPowerShell ScriptPrivilege EscalationSniffingThreat Intelligence

Invoke-ATTACKAPI – A PowerShell Script To Interact With The MITRE ATT& CK Framework Via Its Own API

A PowerShell script to interact with the MITRE ATT&CK Framework via its own API in order to gather information about techniques, tactics, groups, software and references provided by the MITRE ATT&CK Team @MITREattack.GoalsProvide an easy way to interact with the MITRE ATT&CK Framework via its own API and PowerShell to the community.Expedite the acquisition of data from ATT&CK when preparing for a Hunting Campaign.Learn PowerShell Dynamic Parameters :)Getting StartedRequirementsPowerShell version 3+Installing /Importinggit clone Invoke-ATTACKAPIImport-Module .\Invoke-ATTACKAPI.ps1 /$$$$$$ /$$$$$$$$ /$$$$$$$$ /$$$ /$$$$$$ /$$ /$$ /$$$$$$…