PRINT
PRINT
SEND MAIL
SEND MAIL
NEW TOOLS

Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email cybersec@cybeseclabs.com then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

Cookie ManagerCookiescannerMacNEW TOOLS

Cookiescanner – Tool For Check The Cookie Flag In Multiple Sites

Tool for check the cookie flag in multiple sites.IntroTool created to do more easy the process of check the cookie flag when we are analyzing multiple web servers.If you want to know for why could be useful this tools? : cookiescanner.py [options] Example: ./cookiescanner.py -i ips.txtOptions: -h, --help show this help message and exit -i INPUT, --input=INPUT File input with the list of webservers -u URL, --url=URL URL -f FORMAT, --format=FORMAT Output format (json, xml, csv, normal, grepable) -g GOOGLE, --google=GOOGLE Search in…

EXPLOIT-COLLECTORHacking ToolsHomeStatic Analysis

StaCoAn – Mobile App Static Analysis Tool

StaCoAn is a cross-platform tool which aids developers, bug bounty hunters and ethical hackers performing mobile app static analysis on the code of the application for both native Android and iOS applications. This tool will look for interesting lines in the code which can contain: Hardcoded credentials API keys URL’s of API’s Decryption keys Major coding mistakes This tool was created with a big focus on usability and graphical guidance in the user interface. Read the rest of StaCoAn – Mobile App Static Analysis…

GNUJSONMalPipeMalShareMalware AnalysisNEW TOOLSScanVirusTotalYara

MalPipe – Malware/IOC Ingestion And Processing Engine

MalPipe is a modular malware (and indicator) collection and processing framework. It is designed to pull malware, domains, URLs and IP addresses from multiple feeds, enrich the collected data and export the results.At this time, the following feeds are supported:VirusTotal ()MalShare ()BambenekFeeds (osint.bambenekconsulting.com/feeds/)FeodoBlockList ()Malc0deIPList ()NoThinkIPFeeds (www.nothink.org/)OpenPhishURLs ()TorNodes ()Getting StartedThese instructions will get you a copy of the project up and running on your local machine for development and testing purposes. See deployment for notes on how to deploy the project on a live system.InstallingDeployment…

APT criminalAPT reportsFeaturedHackers AttacksIndustrial threatsSecurity FeedsTargeted attackVulnerabilities and exploitsWatering hole attacks

Energetic Bear/Crouching Yeti: attacks on servers

Energetic Bear/Crouching Yeti is a widely known APT group active since at least 2010. The group tends to attack different companies with a strong focus on the energy and industrial sectors. Companies attacked by Energetic Bear/Crouching Yeti are geographically distributed worldwide with a more obvious concentration in Europe and the US. In 2016-2017, the number of attacks on companies in Turkey increased significantly. The main tactics of the group include sending phishing emails with malicious documents and infecting various servers. The group uses some…

MacNEW TOOLSRed Team ArsenalRTAScanSecurity ToolsSkipfishSPFWebsecurityWPScan

RTA (Red Team Arsenal) – An Intelligent Scanner To Detect Security Vulnerabilities In Companies Layer 7 Assets

Red Team Arsenal is a web/network security scanner which has the capability to scan all company's online facing assets and provide an holistic security view of any security anomalies. It's a closely linked collections of security engines to conduct/simulate attacks and monitor public facing assets for anomalies and leaks.It's an intelligent scanner detecting security anomalies in all layer 7 assets and gives a detailed report with integration support with nessus. As companies continue to expand their footprint on INTERNET via various acquisitions and geographical…

CTF ChallengesTUTORIALS

Hack the Box Challenge Kotarak Walkthrough

Hello friends!! Today we are going to solve another CTF challenge “Kotarak” which is available online for those who want to increase their skill in penetration testing and black box testing. Kotarak is retired vulnerable lab presented by Hack the Box for making online penetration practices according to your experience level; they have the collection of vulnerable labs as challenges from beginners to Expert level. Level: Hard Task: find user.txt and root.txt file on victim’s machine. Since these labs are online available therefore they have static IP and IP of sense is 10.10.10.55 so…

Network AccessNEW TOOLSSSO

How Can Manufacturing Companies Improve Network Access and Security?

The manufacturing industry faces complex challenges other sectors of the economy need not worry about. Manufacturers rely heavily on everything from positive global economic trends to laws that lift certain burdens. And companies involved with manufacturing consistently focus on increased productivity with an eye for maintaining a cost-effective bottom line. While all these things present unique challenges. Arguably, among the most difficult challenges come from maximizing security on all levels. Computers, IT networks, and data storage locations must remain secure or else all kinds…

MacNEW TOOLSPython3SambaSMBSMBruteWordlist

SMBrute – SMB Protocol Bruteforce

SMBrute is a program that can be used to bruteforce username and passwords of servers that are using SMB (Samba).Install SMBrute$ git clone smbrute$ cd smbrute$ pip3 install pysmb, humanfriendly$ python3 smbrute.pyUsage:$ python3 smbrute.py -h 188.10.73.147 _____ _____ _____ _ | __| | __ |___ _ _| |_ ___ |__ | | | | __ -| _| | | _| -_||_____|_|_|_|_____|_| |___|_| |___|SMBrute - SMB Protocol Bruteforce Version 0.1.0 Momo Outaadi (M4ll0k)----------------------------------------[+] Host 188.10.73.147 authentication disabled[+] Showing folders..------------------------------------------------| Name | Type | Comments…