Ddos2track – Script To Avoid HTTP Floods Attacks

0

With Ddos2track tool you can block HTTP Flood Attacks and break down them with a honeypot. THE TOOL SEND YOU AN ADVERTISING EMAIL AFTER DETECT A DDOS ATTACK! To begin with begin the honeypot server (tools/analyze/logger.py). At that point begin the locator (tools/detector/detector.sh) in another window. On the off chance that an attacker attack your server in preconfigured port (80), the indicator will redirect...

Libsodium – Easy To Use Software Library

0

Libsodium is a modern, portable, easy to use crypto library. Sodium is a new, easy-to-use software library for encryption, decryption, signatures, password hashing and more. It is a portable, cross-compilable, installable, packageable fork of NaCl, with a compatible API, and an extended API to improve usability even further. Its goal is to provide all of the core operations needed to build...

Instagram-Py – Python Script To Brute Force Attack

0

Instagram-Py is a straightforward python script to perform brute force attack against Instagram , this script can sidestep login restricting on wrong passwords , so fundamentally it can test boundless number of passwords. Instagram-Py is demonstrated and can test more than 6M passwords on a solitary instagram account with less resource as possible. This script copies the exercises of the authority...

Evasi0n Jailbreaking Tools For Apple iOS 7.x & 6.x Users

0

Evasi0n Jailbreaking apparatuses accessible for Apple iOS 7 clients. This jailbreak utility/tool made by Evad3rs group following 3 months of iOS 7 released. evasi0n is accessible for Mac and Windows, and is untethered. Here are the necessities posted on the evasi0n site: A PC, running Windows (XP least), Mac OS X (10.6 least) or Linux (x86/x86_64) iTunes installed in...

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

0

WiFi-Pumpkin is an extremely total system for evaluating Wi-Fi security. The fundamental feature is the capacity to make a phony AP and make Man In The Middle attack, however the rundown of highlights is very expansive. Also Read Androl4b – Android Security Virtual Machine Installation WiFi-Pumpkin Python 2.7 git clone https://github.com/P0cL4bs/WiFi-Pumpkin.git cd WiFi-Pumpkin ./installer.sh --install or download .deb file to install sudo dpkg -i...

Androl4b – Android Security Virtual Machine

0

AndroL4b is an android security virtual machine in view of ubuntu-mate incorporates the gathering of most recent framework, tutorials and labs from various security nerds and researchers for reverse engineering and malware analysis. Changes in Androl4b v.3? Tools are updated New tools and lab added Upgraded to Ubuntu mate 17.04 Some cleanup Also Read Onion nmap To Scan Hidden Onion Services Example Tools Radare2...

CloudFrunt Tool For Identifying Misconfigured CloudFront Domains

0

CloudFrunt is a tool for identifying misconfigured CloudFront domains. CloudFront is a Content Delivery Network (CDN) gave by Amazon Web Services (AWS). CloudFront clients make "distributions" that serve content from particular sources (an S3 container, for instance). Each CloudFront distribution has a remarkable endpoint for clients to point their DNS records to (ex. d111111abcdef8.cloudfront.net). The greater part of the areas...

Microsoft Windows Hacking Pack – WHP

0

Tools here for Windows Hacking Pack are from different sources. The repo is generally licensed with WTFPL, but some content may be not (eg. sysinternals). "pes" means "PE Scambled". It's useful sometimes. Remote Exploits For Windows Hacking Pack ========================================= Windows 2000 / XP SP1 MS05-039 Microsoft Plug and Play Service Overflow, Works with SSDP too http://www.rapid7.com/db/modules/exploit/windows/smb/ms05_039_pnp Windows XP/NT (beofre SP2) MS03-026 Microsoft RPC DCOM Interface...

Bad-PDF To Steal NTLM Hashes From Windows Machines

0

Bad-PDF make pernicious PDF to steal NTLM Hashes from windows machines, it use defenselessness revealed by checkpoint group to make the malicious PDF record. Bad-Pdf peruses the NTLM hashes utilizing Responder listener. This strategy deal with all PDF readers(Any version) and java scripts are not required for this attack. Reference : https://research.checkpoint.com/ntlm-credentials-theft-via-pdf-files/ Also Read EggShell – Remote Administration Tool For iOS/macOS Dependency To Steal...

EggShell – Remote Administration Tool For iOS/macOS

0

EggShell is a post misuse surveillance instrument written in Python. It gives you a command line session with additional usefulness amongst you and an objective machine. EggShell gives you the power and convenience of uploading/downloading records, tab completion, taking pictures, location tracking, shell command execution, persistence, escalating privileges, password retrieval, and much more. This is venture is a proof...