PRINT
PRINT
SEND MAIL
SEND MAIL

Tag: collection

NEW TOOLS

Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email cybersec@cybeseclabs.com then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

Cyber BitesCyber Threats

Hacker behind ‘Collection #1’ Data Dump revealed.

Researchers say they have identified the threat actor behind the massive “Collection #1” data dump which exposed hundreds of millions of credentials on a hacking forum in January. Recorded Future researchers said this weekend that an individual using the moniker “C0rpz” has claimed as early as Jan. 7 to be the original creator and seller of the Collection #1 data. The original database of breached emails – totalling 773 million unique email addresses –was discovered a popular underground hacking forum on Jan. 17. Source:…

Command LineNEW TOOLSWhatsAppWhatsapp Automation

Whatsapp Automation – A Collection Of Tools For Sending And Recieving Whatsapp Messages

Whatsapp Automation is a collection of APIs that interact with WhatsApp messenger running in an Android emulator, allowing developers to build projects that automate sending and receiving messages, adding new contacts and broadcasting messages multiple contacts.The project uses Selinium, Appium, Python and Android Virtual Device Emulator.Demo Video:Requirements:javaAndroid Studio & Android Emulator setup with latest Android versionAppium Server to interact with Emulatorpython environment for running FlaskRabbitMQ for maintaining queue system for incoming requestsSetting up:[Configuration]Edit configs/dev.cfg file with your mysql credentials, RabbitMQ credentials and Queue names…

AggressorAggressor ScriptsAggressorScriptsCobalt StrikeNEW TOOLSRed TeamRegistryScripts

AggressorScripts – Collection Of Aggressor Scripts For Cobalt Strike 3.0+ Pulled From Multiple Sources

Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources:All_In_One.cna v1 - Removed and outdated All purpose script to enhance the user's experience with cobaltstrike. Custom menu creation, Logging, Persistence, Enumeration, and 3rd party script integration.Version 2 is currently in development!ArtifactPayloadGenerator.cna Generates every type of Stageless/Staged Payload based off a HTTP/HTTPS Listener Creates /opt/cobaltstrike/Staged_Payloads, /opt/cobaltstrike/Stageless_Payloads AVQuery.cna Queries the Registry with powershell for all AV Installed on the target Quick and easy way to get the AV you are dealing with as an…

ADELARPAWSBeeswarmBreadcrumbsgolangHoneybitsHoneyTokenHoneytrapMySQLNEW TOOLSNmapPcapRDPRegistry

Honeybits – A Simple Tool Designed To Enhance The Effectiveness Of Your Traps By Spreading Breadcrumbs & Honeytokens Across Your Systems

A simple tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your production servers and workstations to lure the attacker toward your honeypots.Author: Adel "0x4D31" Karimi.BackgroundThe problem with the traditional implementation of honeypots in production environments is that the bad guys can ONLY discover the honeypots by network scanning which is noisy! The only exception I can think of is Beeswarm (it intentionally leaks credentials in the network traffic and then looks for the unexpected reuse of these…

BitbucketDebianEmailsGitHubGitlabGitmailsGoHarvesterInformation GatheringMacNEW TOOLSPython3Version control

Gitmails – An Information Gathering Tool To Colect Git Commit Emails In Version Control Host Services

An information gathering tool to colect git commit emails in version control host services.OverviewGitmails explores that git commits contains a name and an email configured by the author and that version control host services are being used to store a lot of projects.What Gitmails does is:Query the version control host services for information about an organization, team, group, user or single repository;List all repositories (restricted by authentication) if not on single repository mode;Clone the repository or query the version control host service for the…

GNUJSONMalPipeMalShareMalware AnalysisNEW TOOLSScanVirusTotalYara

MalPipe – Malware/IOC Ingestion And Processing Engine

MalPipe is a modular malware (and indicator) collection and processing framework. It is designed to pull malware, domains, URLs and IP addresses from multiple feeds, enrich the collected data and export the results.At this time, the following feeds are supported:VirusTotal ()MalShare ()BambenekFeeds (osint.bambenekconsulting.com/feeds/)FeodoBlockList ()Malc0deIPList ()NoThinkIPFeeds (www.nothink.org/)OpenPhishURLs ()TorNodes ()Getting StartedThese instructions will get you a copy of the project up and running on your local machine for development and testing purposes. See deployment for notes on how to deploy the project on a live system.InstallingDeployment…

AWSAWS PwnEC2HiddenMacNEW TOOLSpenetration testing

AWS Pwn – A Collection Of AWS Penetration Testing Junk

This is a collection of horribly written scripts for performing various tasks related to penetration testing AWS. Please don't be sad if it doesn't work for you. It might be that AWS has changed since a given tool was written or it might be that the code sux. Either way, please feel free to contribute.Most of this junk was written by Daniel Grzelak but there's been plenty of contributions, most notably Mike Fuller.Requirementspip install -r requirements.txtMake sure to also set up your aws credentials…