Thủ Phủ Hacker Mũ Trắng Buôn Ma Thuột

Chương trình Đào tạo Hacker Mũ Trắng Việt Nam tại Thành phố Buôn Ma Thuột kết hợp du lịch. Khi đi là newbie - Khi về là HACKER MŨ TRẮNG !

Sayfalar

RPEF - Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers

Router Post-Exploitation FrameworkCurrently, the framework includes a number of firmware image modules:'Verified' - This module is confirmed to work and is stable.'Unverified' - This module is believed to work or should work with little additional effort, but awaits being tested on a physical device.'Testing' - This module is currently undergoing development and is unstable for the time being. Users...

USBPcap - USB Packet capture for Windows (open-source USB Sniffer for Windows)

USBPcap is an open-source USB sniffer for Windows.USB Packet capture for Windows TourDownload USBP...

CeWL - Custom WordList Generator Tool for Password Cracking

CeWL is a ruby app which spiders a given url to a specified depth, optionally following external links, and returns a list of words which can then be used for password crackers such as John the Ripper.CeWL also has an associated command line app, FAB (Files Already Bagged) which uses the same meta data extraction techniques to create author/creator lists from already downloaded.Usage cewl [OPTION] ... URL --help, -hShow help--depth x, -d xThe depth to spider to, default 2--min_word_length, -mThe minimum word length, this strips out all words...

John the Ripper 1.8.0-jumbo-1 - Fast Password Cracker

John the Ripper is a free password cracking software tool. Initially developed for the Unix operating system, it now runs on fifteen different platforms (eleven of which are architecture-specific versions of Unix, DOS, Win32, BeOS, and OpenVMS). It is one of the most popular password testing and breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker. It...

PuttyRider - Hijack Putty sessions in order to sniff conversation and inject Linux commands

PuttyRider injects a DLL into a running putty.exe process in order to sniff all communication and inject Linux commands on the remote server.This can be useful in an internal penetration test when you already have access to a sysadmin’s machine who has a Putty session open to a Linux server. You can use PuttyRider to take control of the remote server using the existing SSH session. The tool has been recently presented at Defcamp 2014 – a security...

Windows Password Kracker - Free Windows Password Recovery Software

Windows Password Kracker is a free software to recover the lost or forgotten Windows password. It can quickly recover the original windows password from either LM (LAN Manager) or NTLM (NT LAN Manager) Hash. Windows encrypts the login password using LM or NTLM hash algorithm. Since these are one way hash algorithms we cannot directly decrypt the hash to get back the original password. In such cases 'Windows Password Kracker' can help in recovering...

Snort 3.0 - Network intrusion prevention and detection system (IDS/IPS)

Snort is the most powerful IPS in the world, setting the standard for intrusion detection. So when we started thinking about what the next generation of IPS looked like we started from scratch.FeaturesSupport multiple packet processing threadsShared configuration and attribute tableUse a simple, scriptable configurationMake key components pluggableAutodetect services for portless configurationSupport sticky buffers in rulesAutogenerate reference...

LOIC 1.0.8 (Low Orbit Ion Cannon) - A network stress testing application

Low Orbit Ion Cannon (LOIC) is an open source network stress testing and denial-of-service attack application, written in C#. LOIC was initially developed by Praetox Technologies, but was later released into the public domain, and now is hosted on several open source platforms.LOIC performs a denial-of-service (DoS) attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP or UDP packets with the...

Android Studio - The official Android IDE

Android Studio is the official IDE for Android application development, based on IntelliJ IDEA. On top of the capabilities you expect from IntelliJ, Android Studio offers:Flexible Gradle-based build systemBuild variants and multiple apk file generationCode templates to help you build common app featuresRich layout editor with support for drag and drop theme editingLint tools to catch performance, usability, version compatibility, and other problemsProGuard...

THC-SmartBrute - Finds undocumented and secret commands implemented in a smartcard

This tool finds undocumented and secret commands implemented in a smartcard. An instruction is divided into Class (CLA), Instruction-Number (INS) and the parameters or arguments P1, P2, P3. THC-SMARTBRUTE iterates through all the possible values of CLA and INS to find a valid combination.Furthermore it tries to find out what parameters are valid for a given class and instruction number.Requirements You need a PC/SC compatible smartcard reader that...

AutoScan-Network - Automatically scan your network

AutoScan-Network is a network scanner (discovering and managing application). No configuration is required to scan your network. The main goal is to print the list of connected equipments in your network.System Requirements : •Mac OS X 10.5 or later•Microsoft Windows (XP, Vista)•GNU/Linux•Maemo 4•Sun OpenSolarisFeatures:• Fast network scanner • Automatic network discovery • TCP/IP scanner • Wake on lan functionality • Multi-threaded...

THC-Hydra 8.1 - Network Logon Cracker

 A very fast network logon cracker which support many different services.See feature sets and services coverage page - incl. a speed comparison against ncrack and medusa.Number one of the biggest security holes are passwords, as every password security study shows.This tool is a proof of concept code, to give researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system.There...

zANTI 2.0 - Android Network Toolkit

zANTI is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network.ScanUncover authentication, backdoor, and brute-force attacks, DNS and protocol-specific attacks and rogue access points...

Samurai Web Testing Framework 3.0 - LiveCD Web Pen-testing Environment

The Samurai project team is happy to announce the release of a development version of the Samurai Web Testing Framework. This release is currently a fully functional linux environment that has a number of the tools pre-installed. Our hope is that people who are interested in making this the best live CD for web testing will provide feedback for what they would like to see included on the CD.The Samurai...

Hash Manager - Recovering passwords to hashes

The software is designed for recovering passwords to hashes, and it features the following:Supports over 330 hashing algorithms.Contains over 50 additional utilities for handling hashes, passwords, and dictionaries.Unlimited loadable hashes, dictionaries, rules, and masks.Multithreading.64 bits.Maximum optimization for working with large hash lists.Maximum optimization for working with dictionaries.Optimization for newest CPU.Hashing modules as stand-alone...

Isowall - A mini-firewall that completely isolates a target device from the local network

This is a mini-firewall that completely isolates a target device from the local network. This is for allowing infected machines Internet access, but without endangering the local network.Building This project depends upon libpcap, and of course a C compiler.On Debian, the following should work:# apt-get install git gcc make libpcap-dev# git clone https://github.com/robertdavidgraham/isowall# cd isowall# makeThis will put the binary isowall in the...

CuckooAutoInstall - Auto Installer Script for Cuckoo Sandbox

What is Cuckoo Sandbox?In three words, Cuckoo Sandbox is a malware analysis system.What does that mean?It simply means that you can throw any suspicious file at it and in a matter of seconds Cuckoo will provide you back some detailed results outlining what such file did when executed inside an isolated environment.CuckooAutoInstall was created to avoid wasting time installing Cuckoo Sandbox in Debian Stable.Usage Execute the script: sh cuckooautoinstall.shAdd...

LinEnum - Local Linux Enumeration & Privilege Escalation Checks

LinEnum will automate many of the checks that I’ve documented in the Local Linux Enumeration & Privilege Escalation Cheatsheet. It’s a very basic shell script that performs over 65 checks, getting anything from kernel information to locating possible escalation points such as potentially useful SUID/GUID files and Sudo/rhost mis-configurations and more.An additional ‘extra’ feature is that the script will also use a provided keyword...

Crunch - Password Cracking Wordlist Generator

Crunch is a wordlist generator where you can specify a standard character set or a character set you specify. crunch can generate all possible combinations and permutations.Featurescrunch generates wordlists in both combination and permutation waysit can breakup output by number of lines or file sizenow has resume supportpattern now supports number and symbolspattern now supports upper and lower case characters separately adds a status report when...

Detekt - scans your Windows computer for traces of known surveillance spyware

Detekt is a free tool that scans your Windows computer for traces of FinFisher and Hacking Team RCS, commercial surveillance spyware that has been identified to be also used to target and monitor human rights defenders and journalists around the world. In recent years we have witnessed a huge growth in the adoption and trade in communication surveillance technologies. Such spyware provides the ability to read personal emails, listen-in skype conversations...

Lynis 1.6.4 - Security auditing tool for Unix/Linux systems

Lynis is an open source security auditing tool. Primary goal is to help users with auditing and hardening of Unix and Linux based systems. The software is very flexible and runs on almost every Unix based system (including Mac). Even the installation of the software itself is optional!How it worksLynis will perform hundreds of individual tests to determine the security state of the system. Many of these tests are also part of common security...

DAMM - Differential Analysis of Malware in Memory

An open source memory analysis tool built on top of Volatility. It is meant as a proving ground for interesting new techniques to be made available to the community. These techniques are an attempt to speed up the investigation process through data reduction and codifying some expert knowledge.Features ~30 Volatility plugins combined into ~20 DAMM plugins (e.g., pslist, psxview and other elements are combined into a 'processes' plugin)Can run multiple plugins in one invocationThe option to store plugin results in SQLite databases for preservation...

Sparty - MS Sharepoint and Frontpage Auditing Tool

Sparty is an open source tool written in python to audit web applications using sharepoint and frontpage architecture. The motivation behind this tool is to provide an easy and robust way to scrutinize the security configurations of sharepoint and frontpage based web applications. Due to the complex nature of these web administration software, it is required to have a simple and efficient tool that gathers information, check access permissions, dump...

WhoisCL - Get WHOIS records from command-line

WhoisCL is a simple command-line utility that allows you to easily get information about a registered domain. It automatically connect to the right WHOIS server, according to the top-level domain name, and retrieve the WHOIS record of the domain. It supports both generic domains and country code domains.System RequirementsWindows operating system: Windows 98/ME/2000/XP/2003/2008/7/8. Internet connection. On a firewall, you should allow outgoing...

MeterSSH - Meterpreter over SSH

As penetration testers, it’s crucial to identify what types of attacks are detected and what’s not. After running into a recent penetration test with a next generation firewall, most analysis has shifted away from the endpoints and more towards network analysis. While there needs to be a mixture of both, MeterSSH demonstrates how easy it is to circumvent a lot of these signature based “next generation” product lines.MeterSSH is an easy way...

Parrot Security OS - Friendly OS designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, Privacy/Anonimity and Cryptography

Parrot Security OS is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on Debian and developed by Frozenbox network.Who can use itParrot is designed for everyone, from the Pro pentester to the newbie, because it provides the most professional tools combined in a easy to use, fast and lightweight pentesting...