PRINT
PRINT
SEND MAIL
SEND MAIL

Tag: apache

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

CRSDistributedMacModSecurityNEW TOOLSOWASP ModSecurity

CRS – OWASP ModSecurity Core Rule Set

The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with ModSecurity or compatible web application firewalls. The CRS aims to protect web applications from a wide range of attacks, including the OWASP Top Ten, with a minimum of false alerts.The Core Rule Set provides protection against many common attack categories, including:SQL Injection (SQLi)Cross Site Scripting (XSS)Local File Inclusion (LFI)Remote File Inclusion (RFI)Remote Code Execution (RCE)PHP Code InjectionHTTP Protocol Violations    HTTPoxyShellshockSession FixationScanner DetectionMetadata/Error LeakagesProject Honey Pot…

AccuracyAltitudeGeolocationLatitudeLongitudeNEW TOOLSPHPSeekerSystem Information

Seeker v1.0.7 – Get Accurate Location using a Fake Website

Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your loction just like many popular location based websites.Seeker Hosts a fake website on Apache Server and uses Ngrok, website asks for Location Permission and if the user allows it, we can get :LongitudeLatitudeAccuracyAltitude - Not always availableDirection - Only available if user is movingSpeed - Only available if user is movingAlong with Location Information we also get Device Information without any…

AccuracyAltitudeGeolocationLatitudeLongitudeNEW TOOLSPHPSeekerSystem Information

Seeker – Find GeoLocation With High Accuracy

Seeker utilizes HTML5, Javascript, JQuery and PHP to grab Device Information and GeoLocation with High Accuracy.Other tools and services offer IP Geolocation which is not very accurate and does not give location of user. Generally if a user accepts location permsission, Accuracy of the information recieved is accurate to approximately 30 meters. Note : On iPhone due to some reason location accuracy is approximately 65 meters.It Hosts a fake website on Apache Server and uses Ngrok to generate a SSL link which asks for…

BroDebianDjangoIntrusion DetectionIntrusion Detection SystemManagement SystemNEW TOOLSNIDSProbeManager

ProbeManager – Centralize Management Of Intrusion Detection System Like Suricata, Bro, Ossec…

It is common to see that many IDS (intrusion and detection system), including the software and its rules are not updated regularly. This can be explained by the fact the software and rule management is often complicated, which can be a particular problem for small and medium sized enterprises that normally lack system security expertise and full time operators to supervise their respective IDS. This finding encouraged me to develop an application (ProbeManager) that will better manage network and machine detection probes on a…

CrawlingGyoiThonKaliMachine LearningMetasploit FrameworkMetasploit ProNEW TOOLSPenetration TestScan

GyoiThon – A Growing Penetration Test Tool Using Machine Learning

GyoiThon is a growing penetration test tool using Machine Learning.GyoiThon identifies the software installed on web server (OS, Middleware, Framework, CMS, etc...) based on the learning data. After that, it executes valid exploits for the identified software using Metasploit. Finally, it generates reports of scan results. GyoiThon executes the above processing automatically.Processing steps GyoiThon executes the above "Step1" - "Step4" fully automatically.User's only operation is to input the top URL of the target web server in GyoiThon.It is very easy!You can identify vulnerabilities of…

Antivirus EvasionAntivirus TestingAv EvasionDropperEndpoint BypassLoaderMeterpreter Reverse HTTPNEW TOOLSReverse HTTPSpookFlarex86

SpookFlare v2.0 – Loader, Dropper Generator With Multiple Features For Bypassing Client-Side And Network-Side Countermeasures

SpookFlare has a different perspective to bypass security measures and it gives you the opportunity to bypass the endpoint countermeasures at the client-side detection and network-side detection. SpookFlare is a loader/dropper generator for Meterpreter, Empire, Koadic etc. SpookFlare has obfuscation, encoding, run-time code compilation and character substitution features. So you can bypass the countermeasures of the target systems like a boss until they "learn" the technique and behavior of SpookFlare payloads.ObfuscationEncodingRun-time Code CompilingCharacter SubstitutionPatched Meterpreter Stage SupportBlocked powershell.exe Bypass ___ ___ ___ ___ _…

Brute Force AttacksBrute-forceHardeningIntrusion PreventionJShielderLAMPLEMPMySQLNEW TOOLSPHPRemote AccessRootkitSSHSSH server

JShielder – Automates The Process Of Installing All The Necessary Packages To Host A Web Application And Hardening A Linux Server

JSHielder is an Open Source tool developed to help SysAdmin and developers secure there Linux Servers in which they will be deploying any web application or services. This tool automates the process of installing all the necessary packages to host a web application and Hardening a Linux server with little interaction from the user. Newly added script follows CIS Benchmark Guidance to establish a Secure configuration posture for Linux systems.This tool is a Bash Script that hardens the Linux Server security automatically and the…