المشاركات

عرض المشاركات من سبتمبر, ٢٠١٧
صورة
fses - Python Library To Scrap Url'S From Search Engines Fucking Search Engines Scraper - python library to scrap url's from search engines Search Engines we scrap Ask Bing DuckDuck GO UOL Yahoo Install git clone https://github.com/mthbernardes/fses.git cd fses pip install -r requeriments.txt Usage Simple search using Ask from searchEngines.ask import ask print "Ask Search" query = "site:domain.com" # Set a dork a = ask() # Start a instance of any search engine results = a.search(query,verbose=True) #All classes use the method search, verbose is used just to print, what page the script is scraping for url in results  print url All search engine methods query = "site:domain.com" from searchEngines.ask import ask print "Ask Search" results.extend(ask().search(query,verbose=verbose)) from searchEngines.uol import uol print "UOL Search" results.e...
صورة
RedSnarf - A Pen-Testing / Red-Teaming Tool For Windows  Environments RedSnarf  is a pen-testing / red-teaming tool by Ed Williams for retrieving hashes and credentials from Windows workstations, servers and domain controllers using OpSec Safe Techniques. RedSnarf functionality includes: Retrieval of local SAM hashes Enumeration of user/s running with elevated system privileges and their corresponding lsa secrets password; Retrieval of MS cached credentials; Pass-the-hash; Quickly identify weak and guessable username/password combinations (default of administrator/Password01); The ability to retrieve hashes across a range; Hash spraying - Credsfile will accept a mix of pwdump, fgdump and plain text username and password separated by a space; Lsass dump for offline analysis with Mimikatz; Dumping of Domain controller hashes using NTDSUtil and retrieval of NTDS.dit for local parsing; Dumping of Domain controller hashes using the drsuap...
صورة
Demiguise - HTA Encryption Tool for RedTeams What does it do? The aim of this project is to generate . html files that contain an encrypted HTA file. The idea is that when your target visits the page, the key is fetched and the HTA is decrypted dynamically within the browser and pushed directly to the user. This is an evasion technique to get round content / file-type inspection implemented by some security-appliances. This tool is not designed to create awesome HTA content. There are many other tools/techniques that can help you with that. What it might help you with is getting your HTA into an environment in the first place, and (if you use environmental keying) to avoid it being sandboxed. How does it do it? This is achieved by encrypting the HTA file using RC4, and then using navigator.msSaveBlob to "save" the file at runtime - rather than fetching the HTA directly from the server. Meaning that at no point is there any HTTP request/response that contains...
صورة
UniByAv - Shellcode Obfuscator Anti-Virus Friendly UniByAv is a simple obfuscator that take raw shellcode and generate executable that are Anti-Virus friendly. The obfuscation routine is purely writtend in assembly to remain pretty short and efficient. In a nutshell the application generate a 32 bits xor key and brute force the key at run time then  perform the decryption of the actually shellcode. -------------------------------------------------------------------------------------------------------------------------- Usage $ python UniByAv4.1.py shellcode test.exe /cygdrive/c/Program\ Files\ \(x86\)/CodeBlocks/MinGW/bin/ UniByAv4.1 Shellcode encoder tool / Mr.Un1k0d3r RingZer0 Team 2014 Currently running under (cygwin) LINUX switch is set to 0 Self decoding payload written in assembly [+]     Generating xoring key [+]     Xoring key is set to 0x150014cc [+]     Original shellcode size is (13) bytes adding (3)...
صورة
sdnpwn - An SDN Penetration Testing Toolkit T he Open Networking Foundation defines SDN as “The physical separation of the network control plane from the forwarding plane, and where a control plane controls several devices”. What this means is that the decision making which would traditionally be performed by a router or a switch (i.e. forwarding decisions), is moved to a central device known as a controller. Routers and switches become generic forwarding devices (also known simply as ‘switches’). These forwarding devices, or switches, communicate with the controller at the Southbound Interface (SBI) in order to receive instructions on how to forward network traffic. Applications may communicate with the controller at the Northbound Interface (NBI) to receive network statistics or influence traffic forwarding decisions. sdnpwn is a toolkit and framework for testing the security of Software-Defined Networks (SDNs).  Installation First download sdnpwn using git ...
صورة
NMapGUI - Advanced Graphical User Interface for NMap NMap GUI is an advanced graphical user interface for NMap network analysis tool. It allows to extend and ease the typical usage of NMap by providing a visual and fast interface with the application. ---------------------------------------------------------------------------- Features Multiple command execution at the same time. Standard NMap output. HTML report NMap output. Saving output as XML. Output minimizing, maximizing and deleting. Menu to find most of nmap options. Start and stop the webapp at any moment. Screenshots Installation For the moment, NMapGUI can't be installed, it's just a compressed java jar application. So just go to the releases page and download the latest zip, unzip it and enjoy NMapGUI! On progress: Menu creation Usage Starting the application For the moment, you will have to execute the jar file. If you have java properly configured in your Linu...