Browsing category

Hackers Repository

Genact – A Nonsense Activity Generator

Pretend to be busy or waiting for your computer when you should actually be doing real work! Impress people with your insane multitasking skills. Just open a few instances of genact and watch the show. genact has multiple scenes that pretend to be doing something exciting or useful when in reality nothing is happening at […]

WindowsSpyBlocker v4.26 releases: Block spying and tracking on Windows

WindowsSpyBlocker is an application written in Go and delivered as a single executable to block spying and tracking on Windows systems. The initial approach of this application is to capture and analyze network traffic based on a set of tools. It is open for everyone and if you want to contribute or need help, take a look at the Wiki. Telemetry […]

ThreatHunt: PowerShell repository to train your threat hunting skills

ThreatHunt is a simple PowerShell repository that allows you to train your threat hunting skills. ThreatHunt allows you to simulate a variety of attack techniques and procedures without leveraging malicious files. It is not a penetration system tool or framework but instead a very simple way to raise security alerts that help you to train […]

ReconPi – Set Up Your Raspberry Pi To Perform Basic Recon Scans

ReconPi – A lightweight recon tool that performs extensive reconnaissance with the latest tools using a Raspberry Pi.Start using that Raspberry Pi — I know you all have one laying around somewhere ? InstallationCheck the updated blogpost here for a complete guide on how to set up your own ReconPi: ReconPi GuideIf you prepared your […]

CAINE 11 – GNU/Linux Live Distribution For Digital Forensics Project, Windows Side Forensics And Incident Response

CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project. Currently, the project manager is Nanni Bassetti (Bari – Italy). CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. The main design objectives that CAINE […]

[Blackhat Europe tool] dsiem: Security event correlation engine for ELK stack

Dsiem Dsiem is a security event correlation engine for ELK stack, allowing the platform to be used as a dedicated and full-featured SIEM system. Dsiem provides OSSIM-style correlation for normalized logs/events, perform lookup/query to threat intelligence and vulnerability information sources, and produces risk-adjusted alarms.   Features Runs in standalone or clustered mode with NATS as messaging bus between frontend and backend […]

Ngrev – Tool For Reverse Engineering Of Angular Applications

Graphical tool for reverse engineering of Angular projects. It allows you to navigate in the structure of your application and observe the relationship between the different modules, providers, and directives. The tool performs static code analysis which means that you don’t have to run your application in order to use it.How to use? macOS Go […]

Hull Man Sentenced for Reselling Drugs from the Darkweb

A young man from Hull, United Kingdom was sentenced to 3 years in prison for selling ecstasy and ketamine sourced from the darkweb. The defendant admitted that he purchased drugs on the darkweb and resold them locally in nightclubs and out of his home in Hull. According to reports, 20-year-old Reece Proctor was arrested on […]

pylane: python vm injector with debug tools, based on gdb

pylane Pylane is a python vm injector with debug tools, based on gdb and ptrace. It uses gdb to trace python process, inject and run some code in its python vm. Install pip install pylane Usage use inject command to inject a python script in a process: pylane inject <PID> <YOUR_PYTHON_FILE> use a shell command […]

Functrace – A Function Tracer

functrace is a tool that helps to analyze a binary file with dynamic instrumentation using DynamoRIO (http://dynamorio.org/).These are some implemented features (based on DynamoRIO): disassemble all the executed code disassemble a specific function (dump if these are addresses) get arguments of a specific function (dump if these are addresses) get return value of a specific […]

[BlackHat Europe tool] Real Time Threat Monitoring Tool

Real Time Threat Monitoring Tool V2.0 Monitoring possible threats of your company on the Internet is an impossible task to be achieved manually. Hence many threats of the company go unnoticed until it becomes viral in public. Thus causing monetary/reputation damage. This is where RTTM comes into action. RTTM (Real Time Threat Monitoring Tool) is […]

Red Hat Enterprise Linux 7 and CentOS 7 receive critical kernel security update

Red Hat and CentOS have announced the availability of important kernel security updates for their Red Hat Enterprise Linux 7 and CentOS Linux 7 operating system families. The updates are reported to address two security holes and many other bugs. Specifically, the new Linux kernel security update fixes CVE-2019-14821 and CVE-2019-15239 vulnerabilities. Among them, CVE-2019-15239 may cause local […]

Two Sentenced to Prison for Liverpool Darkweb Drug Operation

Two were sentenced prison for running a “major darkweb dug operation” out of their Liverpool home. According to evidence revealed in court, the duo shipped hundreds of thousands of pounds worth of methamphetamine, MDMA, ketamine, and cocaine to customers across the globe. Officers with the North West Regional Organized Crime Unit raided the Toxteth home […]

[Blackhat Europe tool] RansomCoin: extract cryptocoin addresses and other indicators of compromise from binaries

RansomCoin Extracting metadata and hardcoded Indicators of Compromise from ransomware, in a scalable, efficient, way with cuckoo integrations. Ideally, is it run during cuckoo dynamic analysis, but can also be used for static analysis on large collections of ransomware. Designed to be fast, with low false positive for cryptocurrency addresses. Limited false positives for emails, […]

Open Redirect Payload List

Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.Because the server name in […]

What is the CyberSec Feature?

With each passing year, cybersecurity concerns increase in terms of the number of threats and their severity. Hackers can and will cause massive amounts of damage or destruction to the information systems and accounts of users they victimize. Viruses, malware, ransomware, adware, and other malicious software can irreparably harm computer systems and networks, costing users […]

AntiDisposmail – Detecting Disposable Email Addresses

Antbot.pw provides a free, open API endpoint for checking a domain or email address against a frequently-updated list of disposable domains. CORS is enabled for all originating domains, so you can call the API directly from your client-side code.GET https://antibot.pw/api/disposable?email=radenvodka@0815.su HTTP/1.1The response will be JSON with one boolean property, e.g. {“disposable”:false}Using jQuery? <script> $( “#email” […]

Customs Busted a Darkweb Drug Ring in the Czech Republic

Law enforcement in the Czech Republic arrested five individuals for running an international drug trafficking ring out of Brno. The group allegedly orchestrated the shipment of kilograms of ecstasy pills, cocaine, and methamphetamine into the United States, Australia, and elsewhere. Five residents of Brno, Czech Republic, allegedly sold hundreds of thousands of dollars worth of […]

RetDec – A Retargetable Machine-Code Decompiler Based On LLVM

RetDec is a retargetable machine-code decompiler based on LLVM.The decompiler is not limited to any particular target architecture, operating system, or executable file format: Supported file formats: ELF, PE, Mach-O, COFF, AR (archive), Intel HEX, and raw machine code Supported architectures: 32-bit: Intel x86, ARM, MIPS, PIC32, and PowerPC 64-bit: x86-64, ARM64 (AArch64) Features: Static […]