Shadow Brokers leak trove of NSA hacking tools
The tools were dumped via the Shadow Brokers Twitter account and were accompanied by a blog post, as the group did in the past.Called "Lost in Translation," the blog post contains the usual...
View ArticleCam4 Brute Force - python based tool
Step 1: Get fresh proxylist using proxi.pyStep2: Make a combolist with accounts that you want (user:pass)Step3: Run bru.pyScreenshot:GITHUB PROJECT
View ArticleShodanHat - Search For Hosts Info With Shodan
Search For Hosts Info With Shodan.DependenciesYou need to install shodan with pip install shodan or easy_install shodan.You need to install python-nmap with pip install python-nmap.You need to set your...
View ArticleWifiphiser v1.3 – Fast automated phishing attack against WPA networks.
Wifiphisher is a security tool that mounts fast automated phishing attacks against WPA networks in order to obtain the secret passphrase. It is a social engineering attack that unlike other methods it...
View ArticleDAMM – Differential Analysis of Malware in Memory.
DAMM is An open source memory analysis tool built on top of Volatility. It is meant as a proving ground for interesting new techniques to be made available to the community. These techniques are an...
View ArticleBeRoot - Privilege Escalation for Windows
BeRootBeRoot(s) is a post exploitation tool to check commun Windows misconfigurations to find a way to escalate our privilege.A compiled version is available here.It will be added to the pupy project...
View ArticleHow to be low-level programmer?
What is it?I'm inspired by google-interview-university. I'd like to share my experience and show a roadmap to becoming a low-level programmer because I have found that these skills are not as common as...
View ArticleWindows Remote Administration Tool via Telegram
RAT-via-TelegramWindows Remote Administration Tool via TelegramWhy another one?The current Remote Administration Tools in the market face 2 major problems:Lack of encryption.Require port forwarding in...
View ArticleHow to Make Your Own Pirate Radio Station
Project StepsMake the antenna.Flash the SD card and add music.Edit the config file.Start it up!How the PiFM software works.Going further.Parts:Raspberry Pi single-board computer from the Raspberry Pi...
View ArticleMake a Teeny Tiny FM Spy Transmitter
This project describes how to build an audio spy bug with extremely small dimensions that works with a voltage of only 1.5V. This is a tested design and proven to be working reliably when built as...
View ArticleBrainDamage - Backdoor via Telegram as a C&C Server
A python based backdoor which uses Telegram as C&C server.For Windows Only--> Persistance--> USB spreading--> Port Scanner--> Router Finder--> Run shell commands-->...
View ArticleAres - Python Based Botnet and Backdoor
Ares is made of two main programs:A Command aNd Control server, which is a Web interface to administer the agentsAn agent program, which is run on the compromised host, and ensures communication with...
View ArticleEgeSploit - golang library for malware development
EGESPLOIT is a golang library for malware development, it has few unique functions for meterpreter integration.#DOCUMENTATION CalculateChecksum(x) : Function calculates x digit 8 bit checksum for...
View ArticleNeedle - The iOS Security Testing Framework
Needle is an open source, modular framework to streamline the process of conducting security assessments of iOS apps.Assessing the security of an iOS application typically requires a plethora of tools,...
View ArticleOpen Source Phishing Toolkit
Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness...
View ArticleKing Phisher - Phishing Campaign Toolkit
InstallationFor instructions on how to install, please see the INSTALL.md file. After installing, for instructions on how to get started please see the wiki.King Phisher is a tool for testing and...
View ArticleBeware! Dozens of Linksys Wi-Fi Router Models Vulnerable to Multiple Flaws
Bad news for consumers with Linksys routers: Cybersecurity researchers have disclosed the existence of nearly a dozen of unpatched security flaws in Linksys routers, affecting 25 different Linksys...
View ArticleTaBi - Track BGP Hijacks
Developed since 2011 for the needs of the French Internet Resilience Observatory, TaBi is a framework that ease the detection of BGP IP prefixes conflicts, and their classification into BGP hijacking...
View ArticleTruehunter - Tool to detect TrueCrypt containers
The goal of Truehunter is to detect TrueCrypt containers using a fast and memory efficient approach. It was designed as a PoC some time ago as I couldn't find any open source tool with the same...
View ArticleBelgium bans anonymous prepaid mobile phone SIM cards
A new anti-terror law in Belgium aims to make it impossible for people to buy pay-as-you-go mobile phone SIM cards anonymously.The measure will be enforced in the autumn and comes as part of the...
View Article