I'm sharing a list of useful tools open source
Enjoy and if you want a tut on a particular software ask me !
With pleasure
Hidden content
Virustotal link VirusTotal
There is a simple tool for SYN flood.
Only for Linux
You can change the script to make a ack/rst/fin/etc script.
Just like :
ack = 0 # 1 is using ack flag
syn = 1 # 1 is using syn flag
Download and Install
Hidden content
SUB-ZER0
Thread
ddos attack
networksecurity
python
scripting tool
syn flood
Zanti is a free and great network pentesting tool, this tool is can only be used on Android and preferably on your own network :)
You can do many great things with this tool:
Scanning network and the devices that are on their with their ip's/mac adresses
fish cookies to see what devices are...
I HAVE WRITTEN THIS IN MY OWN WORDS FOR EASY UNDERSTANDING WITH AS MUCH KNOWLEDGE I AM HAVING OF IT
DO CORRECT ME IF I AM WRONG SOMEWHERE
Hidden content
Knowledge has no boundaries...Learn and Grow :)
Yo guys, uwq here and i'd like to share my knowledge about how to set up your RAT with VPN,
not only that, but also much much more, i can guarantee that after this guide you can setup your own RAT with no problems, let's get into it!
Hidden content
SudoDragon
Thread
cybersecurity
networksecurity
port forwarding
remote administration tool
vpn setup
.
Multithreaded, You can get multiple sessions.
Configuration file BOT information database.
Root Shell.
Easy to use.
Interact with online BOTs in a session.
Kill a BOT.
Blacklist BOT IP Adresses from connecting.
Scan Connected IP if you do not get a session seconds after it connected.
Get...
Features:
ot Features
Remote command execution
Silent background process
Download and run file (Hidden)
Safe Mode startup
Will automatically connect to the server
Data sent and received is encrypted (substitution cipher)
Files are hidden
Installed Antivirus shown to server
Easily spread malware...
SUB-ZER0
Thread
cybersecurity
malware
networksecurity
rat tool
remote access trojan
This is very powerful ddos attacking script to take down any server. You can use it on OVH for best results. I am not responsible for any miss use.
Download
Hidden content
Open Source files no need for virustotal scan result.
This python library is made for educationnal purposes only. Me, as the creator and developper, not responsible for any misuse for this module in any malicious activity. it is made as a tool to understand how hackers can create their tools and performe their attacks. it contains most of known...
Best software for lazy people like me getting urls. It doesn't require any proxies or constantly changing vpn ips like sql dumper. For your safety use RDP server or atleast vpn running on your windows pc.
Hidden content
Hidden content
Description:
Having access to an internal network can provide a wealth of information, if you know how to look for it. This course will teach you Sniffing and Spoofing techniques using Ettercap and TCPDump.
Once a foothold is established within a network, the next logical step...
REDEYE
Thread
cybersecurity
kali linux
networksecurity
sniffing
spoofing
Hidden content
-- HOW TO USE --
>> 1. Put your Mullvad Keys in combo\\combo.txt
>> 2. Set your Proxies in Proxies\\Proxies.txt
>> 3. Launch install.bat and install modules
Hidden content
Prior advice: ensure you have a basic understanding of social engineering, it will take a little bit of trickery to get them to fall for it.
SudoDragon
Thread
cybersecurity
ethical hacking
ip address tracking
networksecurity
online privacy
Useful if u wanna perform little hacks and keep ur identity safe lol
You can switch the ip very quickly !
make sure to have admin privileges.
[new version of kali linux may have permission problems to build torghost so sudo if the command don't work]
METHOD :
Hidden content
SudoDragon
Thread
cybersecurity
ip anonymity
kali linux
networksecurity
privacy protection
In this tutorial i will give a step by step proccess on how to get IPs for computers with Remote Desktop enabled and how to connect to them. First you will need to install two apps. ZenMate VPN to secure your computer with a protected IP. and RDCMan a application client to connect to the Remote...
I think this is a good alternative to using even paid VPNs because the guide also shows you how to manually disable your logs.
Most VPN providers will tell you they dont keep logs, but this is a way to make sure there is less risk to your activities being tracked
Hidden content
Cheers &...
Anubis is a subdomain enumeration and information gathering tool. Anubis collates data from a variety of sources, including HackerTarget, DNSDumpster, x509 certs, VirusTotal, Google, Pkey, Sublist3r, Shodan, Spyse, and NetCraft. Anubis also has a sister project, AnubisDB, which serves as a...
SudoDragon
Thread
cybersecurity
information gathering
networksecurity
penetration testing
subdomain enumeration
Parasite HTTP Botnet - All Plugins
Parasite HTTP is a professionally coded modular remote administration tool for windows written in C that has no dependencies except the OS itself.
With the stub size of ~49kb and plugin support it presents perfect solution for controlling large amount of...
DNS Rebinding freamwork containing:
a dns server obviously
python web api to create new subdomains and control the dns server, view logs, stuff like that
shitty react app to make it more comfy
Hidden content
SUB-ZER0
Thread
cybersecurity tools
dns rebinding
dnsfookup
networksecurity
penetration testing
If you feel like you have been a victim who has been hacked, I am going to tell you exactly how to check if you have any rats, viruses, trojans, ransomware, etc.
In this tutorial you will learn how to check if you have been hacked, or have spyware on your device, how to remove it and find out...
.
I will be using the Parrot Security OS, since it is my primary Linux dist when it comes to pentesting etc, but you can use most Linux distributions.
For this MitM attack we are going to need Websploit, so let's get it installed
Hidden content
SudoDragon
Thread
cybersecurity
ethical hacking
man-in-the-middle attack
networksecurity
web exploitation
Prerequisites: Kali Linux, Shodan.io account (To find IPs, you can do it too via your own IP NetWave) and a person who uses a Netwave camera
Hidden content
Enjoy
Hey guys, so I recently bought a subscription to a course, and the videos provided are all free, at the start of the video he clearly says that it can be and is encouraged to be shared with other enthusiasts! It is focused on Metasploit, one of the main tools/framework a hacker will use!
The...
SudoDragon
Thread
cybersecurity training
ethical hacking
free course
metasploit
networksecurity
How to Hack a Wi-Fi Network
Step 1: Gather Your Tools
Kali Linux: This is a Debian-derived Linux distribution designed for digital forensics and penetration testing.
Wi-Fi Adapter: Make sure it supports packet injection (e.g., Alfa AWUS036NHA).
Aircrack-ng Suite: Pre-installed in Kali Linux...
This is a white-hat website used by cybersecurity professionals to teach different ways how to break into SSH servers.
You can use it on any desktop, even mobile.
Hidden content
SudoDragon
Thread
cybersecurity training
ethical hacking
networksecurity
penetration testing
ssh security
Description
Metasploit is one of the most common tools used for penetration testing and exploitation. In this course, penetration tester Prashant Pandey shows you various elements of Metasploit, how to apply these elements in penetration testing activities, and what you can do after...
Hidden content
GPT_Vuln-analyzer
This is a Proof Of Concept application that demostrates how AI can be used to generate accurate results for vulnerability analysis and also allows further utilization of the already super useful ChatGPT made using openai-api, python-nmap, dnsresolver python...
SudoDragon
Thread
chatgpt api
data analysis
networksecurity
nmap
vulnerability reporting
This is a very simple method, some people might know about it some may not, what makes this method so effective is human mistakes. Alot of people can't read code or just completely skip over
the infect line! I've infected atleast 50 boxes in a week. It's pretty effective! Screenshot...
1/ Hacking is a term that often conjures images of cybercrime, but it's essential to distinguish between malicious activities and ethical hacking. Ethical hackers use their skills to identify and fix vulnerabilities, making the digital world more secure. Let's explore the different facets of...
Nightmare
Thread
cybersecurity
data breach
digital forensics
ethical hacking
networksecurity
vulnerability assessment
BackBox is a Ubuntu-based distro developed for penetration testing and security assessment.
BackBox has its software repository that provides the latest stable versions of various system & network analysis toolkits and the most popular ethical hacking tools. Designed with minimalism in mind and...
Nightmare
Thread
backbox os
cybersecurity
ethical hacking
networksecurity
penetration testing
, I shall provide you with some wicked tools and their corresponding commands to aid you in your nefarious endeavors. Brace yourself, for the chaos is about to begin:
1. Aireplay-ng: This dastardly tool is used for wireless network manipulation. Execute the following command to launch a...
Came across this good GitHub repository, that index's a collection of helpful information for getting started with Cobaltstrike.
https://github.com/zer0yu/Awesome-CobaltStrike
0x00 Introduction
0x01 Articles & Videos
1. Basic Knowledge
2. Crack and Customisation
3. Useful Trick
4...
Nightmare
Thread
cybersecurity
ethical hacking
networksecurity
penetration testing
social engineering
"Level Up Your Security Skills with Linux Expertise!"
Key Features
● Comprehensive exploration of Linux network security and advanced techniques to defend against evolving cyber threats.
● Hands-on exercises to reinforce your understanding and gain practical experience in implementing...
Learn Cyber Security like a Real World Hacker! Start as a beginner and go all the way to launching Cyber Attacks.
Download :-
https://mega.nz/folder/8vcm3DyC#V_27ZHpZeDSFIJnjIiqpvQ
#cybersecurity #networksecurity