Jump to content

0x1

LvL-23
  • Posts

    875
  • Joined

  • Last visited

  • Days Won

    6

0x1 last won the day on December 3 2015

0x1 had the most liked content!

3 Followers

About 0x1

  • Birthday 03/03/1900

Recent Profile Visitors

7,378 profile views

0x1's Achievements

Aspiring Hacker

Aspiring Hacker (4/5)

6.2k

Reputation

3

Community Answers

  1. 0x1

    Super Xray

    Super Xray XRAY GUI Starter (Web Vulnerability Scanner) Xray is an excellent web vulnerability scanning tool, But only the command line version, Start via config.yaml file. In many cases, it is difficult to get started, and a GUI tool is needed to help newcomers use it faster. This tool is just a simple command line wrapper, not a direct method call. In the planning of xray, there will be a truly perfect GUI version of XrayPro tool in the future. Please look forward to it. Please Note: The screenshot in this doc is Chinese, but there is a button to select English UI Must be running above JDK8 Please use a resolution of 1080P or above, and it may not be fully displayed at a resolution of 720P or below Other Note: There is JRE 8+ environment locally Must use java -jar SuperXray.jar start(Double click startup will cause permission problems in Windows) Please use the latest version of xray (this tool is not compatible with the old version of xray) Download && Source [Hidden Content]
  2. 0x1

    permasigneriOS

    Permasigner on iOS PermasigneriOS is a free iOS app allowing you to sign permanently IPA files on your jailbroken iDevice. Once an app is signed with PermasigneriOS and installed on your device it will work without any time limitations or even after a restart. It works on iOS 14 and will support iOS 15. The app uses the same technique (CoreTrust bypass by Linus Henze) to permanently sign IPA files like the recently released IPA Permasigner script for Linux and macOS. What's important, it's an on-device tool that doesn't require form you to use a computer. Only jailbreak is required! Is compatible with iOS iOS 14.0 to 15.4.1. Download && Cydia Repo [Hidden Content]
  3. 0x1

    AutoPWN Suite

    AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically. Features Fully automatic! (Use -y flag to enable) Detect network IP range without any user input. Vulnerability detection based on version. Get information about the vulnerability right from your terminal. Automatically download exploit related with vulnerability. Noise mode for creating a noise on the network. Evasion mode for being sneaky. Automatically decide which scan types to use based on privilege. Easy to read output. Function to output results to a file. Argument for passing custom nmap flags. Specify your arguments using a config file. Usage Running with root privileges (sudo) is always recommended. Automatic mode (This is the intended way of using AutoPWN Suite.) autopwn-suite -y Help Menu $ autopwn-suite -h usage: autopwn.py [-h] [-o OUTPUT] [-t TARGET] [-hf HOSTFILE] [-st {arp,ping}] [-nf NMAPFLAGS] [-s {0,1,2,3,4,5}] [-a API] [-y] [-m {evade,noise,normal}] [-nt TIMEOUT] [-c CONFIG] [-v] AutoPWN Suite options: -h, --help show this help message and exit -o OUTPUT, --output OUTPUT Output file name. (Default : autopwn.log) -t TARGET, --target TARGET Target range to scan. This argument overwrites the hostfile argument. (192.168.0.1 or 192.168.0.0/24) -hf HOSTFILE, --hostfile HOSTFILE File containing a list of hosts to scan. -st {arp,ping}, --scantype {arp,ping} Scan type. -nf NMAPFLAGS, --nmapflags NMAPFLAGS Custom nmap flags to use for portscan. (Has to be specified like : -nf="-O") -s {0,1,2,3,4,5}, --speed {0,1,2,3,4,5} Scan speed. (Default : 3) -a API, --api API Specify API key for vulnerability detection for faster scanning. (Default : None) -y, --yesplease Don t ask for anything. (Full automatic mode) -m {evade,noise,normal}, --mode {evade,noise,normal} Scan mode. -nt TIMEOUT, --noisetimeout TIMEOUT Noise mode timeout. (Default : None) -c CONFIG, --config CONFIG Specify a config file to use. (Default : None) -v, --version Print version and exit. TODO 11 completed. Support for smaller terminals. Arch Linux package for Arch based systems like BlackArch and ArchAttack. Seperate script for checking local privilege escalation vulnerabilities. Windows and OSX support. Function to brute force common services like ssh, vnc, ftp etc. Built in reverse shell handler that automatically stabilizes shell like pwncat. Function to generate reverse shell commands based on IP and port. GUI interface. Meterpreter payload generator with common evasion techniques. Fileless malware unique to AutoPWN Suite. Daemon mode. Option to email the results automatically. Web application analysis. Web application content discovery mode. (dirbusting) Option to use as a module. Download [Hidden Content]
  4. Puwr - SSH attack surface on local network SSH pivoting script for expanding attack surfaces on local networks Easily expand your attack surface on a local network by discovering more hosts, via SSH. Using a machine running a SSH service, Puwr uses a given subnet range to scope out IP’s, sending back any successful ping requests it has. This can be used to expand out an attack surface on a local network, by forwarding you hosts you couldn’t normally reach from your own device. Usage Puwr is simple to run, only requiring 4 flags: python3 puwr.py (MACHINE IP) (USER) (PASSWORD) (SUBNET VALUE) Example: python3 puwr.py 10.0.0.53 xeonrx password123 10.0.0.1/24 If you need to connect through a port other than 22, use the -p flag. (example: -p 2222) If you want to keep quiet, use the -s flag to wait specified seconds between request. (example: -s 5) Use the -h flag for usage reference in the script. The paramiko and netaddr modules are required for this script to work! You can install them with the pip tool: pip install netaddr paramiko Download [Hidden Content]
  5. MitmProxy2Swagger - Automagically reverse-engineer REST API A tool for automatically converting mitmproxy captures to OpenAPI 3.0 specifications. This means that you can automatically reverse-engineer REST APIs by just running the apps and capturing the traffic. Installation First you will need python3 and pip3. pip install mitmproxy2swagger# ... or ...pip3 install mitmproxy2swagger Then clone the repo and run mitmproxy2swagger as per examples below. Usage Mitmproxy To create a specification by inspecting HTTP traffic you will need to: Capture the traffic by using the mitmproxy tool. I personally recommend using mitmweb, which is a web interface built-in to mitmproxy. $ mitmweb Web server listening at [Hidden Content] Proxy server listening at [Hidden Content] ... IMPORTANT To configure your client to use the proxy exposed by mitm proxy, please consult the mitmproxy documentation for more information. Save the traffic to a flow file. In mitmweb you can do this by using the “File” menu and selecting “Save”: Run the first pass of mitmproxy2swagger: mitmproxy2swagger -i <path_to_mitmptoxy_flow> -o <path_to_output_schema> -p <api_prefix> Please note that you can use an existing schema, in which case the existing schema will be extended with the new data. You can also run it a few times with different flow captures, the captured data will be safely merged. <api_prefix> is the base url of the API you wish to reverse-engineer. You will need to obtain it by observing the requests being made in mitmproxy. For example if an app has made requests like these: [Hidden Content] [Hidden Content] [Hidden Content]/profile The likely prefix is [Hidden Content]. Running the first pass should have created a section in the schema file like this: x-path-templates: # Remove the ignore: prefix to generate an endpoint with its URL # Lines that are closer to the top take precedence, the matching is greedy - ignore:/addresses - ignore:/basket - ignore:/basket/add - ignore:/basket/checkouts - ignore:/basket/coupons/attach/{id} - ignore:/basket/coupons/attach/104754 You should edit the schema file with a text editor and remove the ignore: prefix from the paths you wish to be generated. You can also adjust the parameters appearing in the paths. Run the second pass of mitmproxy2swagger: mitmproxy2swagger -i <path_to_mitmptoxy_flow> -o <path_to_output_schema> -p <api_prefix> [--examples Run the command a second time (with the same schema file). It will pick up the edited lines and generate endpoint descriptions. Please note that mitmproxy2swagger will not overwrite existing endpoint descriptions, if you want to overwrite them, you can delete them before running the second pass. Passing --examples will add example data to requests and responses. Take caution when using this option, as it may add sensitive data (tokens, passwords, personal information etc.) to the schema. HAR Capture and export the traffic from the browser DevTools. In the browser DevTools, go to the Network tab and click the “Export HAR” button. Continue the same way you would do with the mitmproxy dump. mitmproxy2swagger will automatically detect the HAR file and process it. Download && Source [hide][Hidden Content]]
  6. Xepor (pronounced /ˈzɛfə/, zephyr), a web routing framework for reverse engineers and security researchers. It provides a Flask-like API for hackers to intercept and modify HTTP request and/or HTTP response in a human-friendly coding style. This project is meant to be used with mitmproxy. User write scripts with xepor, and run the script inside mitmproxy with mitmproxy -s your-script.py. If you want to step from PoC to production, from demo(e.g. http-reply-from-proxy.py, http-trailers.py, http-stream-modify.py) to something you could take out with your WiFi Pineapple, then Xepor is for you! Features Code everything with @api.route(), just like Flask! Write everything in one script and no if..else any more. Handle multiple URL routes, even multiple hosts in one InterceptedAPI instance. For each route, you can choose to modify the request before connecting to server (or even return a fake response without connection to upstream), or modify the response before forwarding to user. Blacklist mode or whitelist mode. Only allow URL endpoints defined in scripts to connect to upstream, blocking everything else (in specific domain) with HTTP 404. Suitable for transparent proxying. Human readable URL path definition and matching powered by parse Host remapping. define rules to redirect to genuine upstream from your fake hosts. Regex matching is supported. Best for SSL stripping and server side license cracking! Plus all the bests from mitmproxy! ALL operation modes ( mitmproxy / mitmweb + regular / transparent / socks5 / reverse:SPEC / upstream:SPEC) are fully supported. Use Case Evil AP and phishing through MITM. Sniffing traffic from specific device by iptables + transparent proxy, modify the payload with xepor on the fly. Cracking cloud based software license. See examples/krisp/ as an example. Write complicated web crawler in ~100 lines of codes. See examples/polyv_scrapper/ as an example. ... and many more. SSL stripping is NOT provided by this project. Installation pip install xepor Quick start Take the script from examples/httpbin as an example. mitmweb --web-host=\* --set connection_strategy=lazy -s example/httpbin/httpbin.py In this example, we setup the mitmproxy server on 127.0.0.1. You could change it to any IP on your machine or alternatively to the IP of your VPS. The mitmproxy server running in reverse, upstream and transparent mode requires --set connection_strategy=lazy option to be set so that Xepor could function correctly. I recommand this option always be on for best stability. Set your Browser HTTP Proxy to [Hidden Content], and access web interface at [Hidden Content]. Send a GET request from [Hidden Content] , Then you could see the modification made by Xepor in mitmweb interface, browser devtools or Wireshark. The httpbin.py do two things. When user access [Hidden Content], inject a query string parameter payload=evil_param inside HTTP request. When user access [Hidden Content] (we just pretends we don't know the password), sniff Authorization headers from HTTP requests and print the password to the attacker. Just what mitmproxy always do, but with code written in xepor way. # [Hidden Content] from mitmproxy.http import HTTPFlow from xepor import InterceptedAPI, RouteType HOST_HTTPBIN = "httpbin.org" api = InterceptedAPI(HOST_HTTPBIN) @api.route("/get") def change_your_request(flow: HTTPFlow): """ Modify URL query param. Test at: [Hidden Content] """ flow.request.query["payload"] = "evil_param" @api.route("/basic-auth/{usr}/{pwd}", rtype=RouteType.RESPONSE) def capture_auth(flow: HTTPFlow, usr=None, pwd=None): """ Sniffing password. Test at: [Hidden Content]_ """ print( f"auth @ {usr} + {pwd}:", f"Captured {'successful' if flow.response.status_code < 300 else 'unsuccessful'} login:", flow.request.headers.get("Authorization", ""), ) addons = [api] Download [hide][Hidden Content]]
  7. The most popular 3rd party app store for apple devices. Over 1.1 million active devices !!! ZJAILBREAK consists of many impressive 3rd party apps, games, entertainment and much more. Here are the top rated, most downloaded apps you can download from zJailbreak free Bregxi Bregxi is a jailbreak repo extractor with many sources. You can extract the available sources and install jailbreak apps available under these sources. It is compatible with all latest iOS versions as well as device models. Ziyu Ziyu is another Jailbreak repo extractor. It allows extracting the repositories/sources to install Jailbreak / 3rd Party apps on all the iOS versions up to iOS 13.3. FND Store FND store is an alternative app store for Apple App Store. You can search iOS apps from keywords & change your county to install iOS apps in a specific country. Googios Excellent theme collection for Google search on iOS devices. GoogiOS will give a better google search experience. Flemino The Collections of computer OSes and Simulators. Run Computer OSes and Simulator on your iOS 15 and higher devices using Flemino. DreamStore DreamStore is an awesome iOS theme launch collection, exclusively with zJailbreak for all latest iOS versions. iFaceskin iFaceskin is the world's first application to add facebook skins and customized Facebook app icons on the iOS device. YIV YIV is the largest third party game collection for iOS devices. You can play hundreds of brand new games without downloading or installing. and more .... Install a profile [hide][Hidden Content]] After you download a profile,* you’ll see the message Profile Downloaded or Enroll in [organization name]. To install the profile, follow these steps: Open the Settings app. Tap Profile Downloaded or Enroll in [organization name]. iPhone Settings screen showing Profile Downloaded Tap Install in the upper-right corner, then follow the onscreen instructions.
  8. 0x1

    Shhhloader

    Shhhloader is a SysWhispers Shellcode Loader that is currently a Work in Progress. It takes raw shellcode as input and compiles a C++ stub that has been integrated with SysWhispers in order to bypass AV/EDR. The included python builder will work on any Linux system that has Mingw-w64 installed. The tool has been confirmed to successfully load Meterpreter and a Cobalt Strike beacon on fully updated systems with Windows Defender enabled. The project itself is still in a PoC/WIP state, as it currently doesn't work with all payloads. Video Demo [hide][Hidden Content]] Features: 5 Different Shellcode Execution Methods (ProcessHollow, QueueUserAPC, RemoteThreadContext, RemoteThreadSuspended, CurrentThread) PPID Spoofing Block 3rd Party DLLs Syscall Name Randomization XOR Encryption with Dynamic Key Generation Sandbox Evasion via Loaded DLL Enumeration Sandbox Evasion via Checking Processors, Memory, and Time Tested and Confirmed Working on: Windows 10 21H1 (10.0.19043) Windows 10 20H2 (10.0.19042) Windows Server 2019 (10.0.17763) Last Scan Results as of 15/04/22 (Meterpreter): [hide][Hidden Content]] Download [hide][Hidden Content]]
  9. 0x1

    Binary Ninja 3.0

    Binary Ninja is an interactive disassembler, decompiler, and binary analysis platform for reverse engineers, malware analysts, vulnerability researchers, and software developers that runs on Windows, macOS, Linux. Disassemble : Disassemble executables and libraries from multiple formats, platforms, and architectures. Decompile : Decompile code to C or BNIL for any supported architecture - including your own. Automate : Automate analysis with C++, Python, and Rust APIs from inside or outside the UI. Analyze : Visualize control flow and navigate through cross-references interactively. Annotate : Name variables and functions, apply types, create structres, and add comments. Collaborate : Collaborate effortlessly with synchronized commits using our Enterprise product. Disassemble Files Vector 35 provides first-party support for dissassembly from multiple architectures, including x86, x86-64, ARMv7 (with Thumb2), ARMv8 (AArch64), PowerPC, 6502, Z80, and MIPS. Additionally, our community supports many other architectures through our public plugin ecosystem. Loaders are available for all major platforms (PE, Mach-O, ELF) and can be extended or customized using our API. Decompile Code Our built-in decompiler works with all of our officially supported architectures at one price and builds on a powerful family of ILs called BNIL. In fact, not just our architectures, but even community architectures can produce amazing decompilation. Our decompiler outputs to both C and BNIL and can be switched on-demand. Automate Anything Our extensive API can be used to create and customize loaders, add or augment architectures, customize the UI, or automate any workflow (types, patches, decompilation…anything!). Bindings are available for C++, Python, and Rust. Create Plugins Made something cool and want to share? Publish your community plugin and have it featured in our Plugin Manager! These plugins can be installed (or updated) at any time by any customer, right inside the client. Triage Quickly Use our API to quickly batch process files and see the results in our triage view. Use the entropy graph to identify areas of interest, like packed or encrypted data. Click on any location to navigate there quickly. Explore Interactively We didn’t just build the best automation and API for binary analysis, but our UI design is intentional and clean. None of the distractions, but all of the features you need for the biggest jobs including multiple tabs, synchronized and split views, custom layouts and more. Annotate Everything Reverse engineering is the process of exploring the unknown. As your understanding improves, we give you the tools to represent that and improve analysis. Add types, structures, comments, highlights, tags, and more. Patch Effectively Make binary patches quickly and effectively with a variety of tools purpose-built for speed. Edit lines of assembly directly, select a preset patch, edit raw bytes with our hex editor view, or even compile C into the executable directly with our own built in compiler SCC. Switch Platforms You’ll never be stuck. Binary Ninja not only runs seamlessly on Windows, macOS, and Linux, but every purchases includes all three platforms for one price. Run Headlessly No need to only do your analysis inside of Binary Ninja. Instead, bring Binary Ninja into your analysis environment. Use the python repl of your choice, or even statically compile our core analysis library into an existing framework, our analysis can be completely untethered from the UI. Download : [Hidden Content]
  10. Notion - the notetaking app as a C2 OffensiveNotion combines the capabilities of a post-exploitation agent with the power and comfort of the Notion notetaking application. The agent sends data to and receives commands from your Notion page. Your C2 traffic blends right in as the agent receives instructions and posts results via the Notion developer API. And when your blue team looks for evidence of shenanigans, none will be the wiser. Features * A full-featured C2 platform built on the Notion notetaking app. * Easy setup: set up your Notion developer API account, drop the Agent to the target, run and enjoy! * Cross-platform agent built in Rust that compiles for Linux, Windows, and macOS with the same code base. Includes a Python setup/controller script to simplify the process. * A range of capabilities including port-scanning, privilege escalation, asynchronous command execution, file download, and shellcode injection, all controlled from the comfort of a Notion page! * Document as you go! The agent identifies special syntax to run commands, so feel free to use the rest of the Notion page to document your operation. * Collaborative by design! Notion allows for multiple people to edit and view your notes. Your listener page can handle multiple agents and you can invite your red team friends to your page. Congratulations, that's a teamserver! * Mobile C2! Use the Notion application from your mobile device to issue commands to your agents from anywhere in the world. * Stealth! C2 comms ride over the Notion API natively. Your C2 traffic looks like someone is using Notion for its intended purpose. More info && Wiki [hide][Hidden Content]] Download [hide][Hidden Content]]
  11. 0x1

    bkcrack

    Crack legacy zip encryption with Biham and Kocher's known plaintext attack. brief A guide to crack an example encrypted zip file. The example folder contains an example zip file secrets.zip so you can run an attack. Its content is probably of great interest! What is inside Let us see what is inside. Open a terminal in the example folder and ask unzip to give us information about it. $ unzip -Z secrets.zip We get the following output. Archive: secrets.zipZip file size: 56263 bytes, number of entries: 2-rw-rw-r-- 6.3 unx 54799 Bx defN 12-Aug-14 14:51 advice.jpg-rw-rw-r-- 6.3 unx 1265 Bx stor 18-Dec-20 13:33 spiral.svg2 files, 56064 bytes uncompressed, 55953 bytes compressed: 0.2% The zip file contains two files: advice.jpg and spiral.svg. The capital letter in the fifth field shows the files are encrypted. We also see that advice.jpg is deflated whereas spiral.svg is stored uncompressed. Guessing plaintext To run the attack, we must guess at least 12 bytes of plaintext. On average, the more plaintext we guess, the faster the attack will be. The easy way: stored file We can guess from its extension that spiral.svg probably starts with the string <?xml version="1.0" . We are so lucky that this file is stored uncompressed in the zip file. So we have 20 bytes of plaintext, which is more than enough. The not so easy way: deflated file Let us assume the zip file did not contain the uncompressed spiral.svg. Then, to guess some plaintext, we can guess the first bytes of the original advice.jpg file from its extension. The problem is that this file is compressed. To run the attack, one would have to guess how those first bytes are compressed, which is difficult without knowing the entire file. In this example, this approach is not practical. It can be practical if the original file can easily be found online, like a .dll file for example. Then, one would compress it using various compression software and compression levels to try and generate the correct plaintext. Free additional byte from CRC In this example, we guessed the first 20 bytes of spiral.svg. In addition, as explained in the ZIP file format specification, a 12-byte encryption header in prepended to the data in the archive. The last byte of the encryption header is the most significant byte of the file's CRC. We can get the CRC with unzip. $ unzip -Z -v secrets.zip spiral.svg | grep CRC 32-bit CRC value (hex): a99f1d0d So we know the byte just before the plaintext (i.e. at offset -1) is 0xA9. Running the attack Let us write the plaintext we guessed in a file. $ echo -n '<?xml version="1.0" ' > plain.txt We are now ready to run the attack. $ ../bkcrack -C secrets.zip -c spiral.svg -p plain.txt -x -1 A9 After a little while, the keys will appear! [17:42:43] Z reduction using 13 bytes of known plaintext 100.0 % (13 / 13) [17:42:44] Attack on 542303 Z values at index 6 Keys: c4490e28 b414a23d 91404b31 33.9 % (183761 / 542303) [17:48:03] Keys c4490e28 b414a23d 91404b31 Recovering the original files Once we have the keys, we can recover the original files. Choose a new password We assume that the same keys were used for all the files in the zip file. We can create a new encrypted archive based on secret.zip, but with a new password, easy in this example. $ ../bkcrack -C secrets.zip -k c4490e28 b414a23d 91404b31 -U secrets_with_new_password.zip easy Then, any zip file utility can extract the created archive. You will just have to type the chosen password when prompted. Or decipher files Alternatively, we can decipher files one by one. $ ../bkcrack -C secrets.zip -c spiral.svg -k c4490e28 b414a23d 91404b31 -d spiral_deciphered.svg The file spiral.svg was stored uncompressed so we are done. $ ../bkcrack -C secrets.zip -c advice.jpg -k c4490e28 b414a23d 91404b31 -d advice_deciphered.deflate The file advice.jpg was compressed with the deflate algorithm in the zip file, so we now have to uncompressed it. A python script is provided for this purpose in the tools folder. $ python3 ../tools/inflate.py < advice_deciphered.deflate > very_good_advice.jpg You can now open very_good_advice.jpg and enjoy it! Recovering the original password As shown above, the original password is not required to decrypt data. The internal keys are enough. However, we might also be interested in finding the original password. To do this, we need to choose a maximum length and a set of characters among which we hope to find those that constitute the password. To save time, we have to choose those parameters wisely. For a given maximal length, a small charset will be explored much faster than a big one, but making a wrong assumption by choosing a charset that is too small will not allow to recover the password. At first, we can try all candidates up to a given length without making any assumption about the character set. We use the charset ?b which is the set containing all bytes (from 0 to 255), so we not miss any candidate up to length 9. $ ../bkcrack -k c4490e28 b414a23d 91404b31 -r 9 ?b[17:52:16] Recovering passwordlength 0-6...length 7...length 8...length 9...[17:52:16] Could not recover password It failed so we know the password has 10 characters or more. Now, let us assume the password is made of 11 or less printable ASCII characters, using the charset ?p. $ ../bkcrack -k c4490e28 b414a23d 91404b31 -r 11 ?p[17:52:34] Recovering passwordlength 0-6...length 7...length 8...length 9...length 10...100.0 % (9025 / 9025)length 11...100.0 % (9025 / 9025)[17:52:38] Could not recover password It failed again so we know the password has non-printable ASCII characters or has 12 or more characters. Now, let us assume the password is made of 12 or less alpha-numerical characters. $ ../bkcrack -k c4490e28 b414a23d 91404b31 -r 12 ?a[17:54:37] Recovering passwordlength 0-6...length 7...length 8...length 9...length 10...100.0 % (3844 / 3844)length 11...100.0 % (3844 / 3844)length 12...51.8 % (1993 / 3844)[17:54:49] Passwordas bytes: 57 34 73 46 30 72 67 6f 74 74 65 6eas text: W4sF0rgotten Tada! We made the right assumption for this case. The password was recovered quickly from the keys. Download [Hidden Content]
  12. 0x1

    S1EM

    S1EM is a SIEM with SIRP and Threat Intel, a full packet capture, all in one. Today, cyber attacks are more numerous and cause damage in companies. Nevertheless, many software products exist to detect cyber threats. The S1EM solution is based on the principle of bringing together the best products in their field, free of charge, and making them quickly interoperable. Inside the solution: Cluster Elasticsearch Kibana Filebeat Logstash Metricbeat Heartbeat Auditbeat Syslog-ng Elastalert TheHive Cortex MISP OpenCTI Arkime Suricata Zeek StoQ Mwdb Heimdall Traefik Clamav Watchtower Note: Cortex v3.1 use ELK connector and the OpenCTI v4 connector More info & Download : [hide][Hidden Content]]
  13. Be afraid of only god no coronavirus may Allah protect you all
  14. Revenge Rat v0.3 by NAPOLEON Mod by 0x1 Revenge Builder : C# Code by NYAM CAT DotNetToJScript by Tyranid Download [HIDE][Hidden Content]]
  15. PS4 Pro Jailbreak 7.02 CFW Advantage: Back up the game using internal or external Hard Drive Disk (HDD). Play the online game through PSN. Can mod game inside the game option while gameplay... Disadvantage: After downloaded games through PlayStation Store, you are not eligible to transfer those games to another PS4 non-jailbreak console which is protected on mod chips inside console hardware that require the jailbreak in order to read content format. After the game downloaded, those games will not be stored in your PSN account because jailbreak will bypass the credit card when adding the game to the cart without paying an expensive game. Ref : [Hidden Content] PS4 PKG Tool: The tool allows us to manage and perform various operations on PS4 PKG. [HIDE][Hidden Content]] PS3DumpChecker: A PS3 NOR/NAND Dump Checker/Verifier [HIDE][Hidden Content]] PS4_Tools: Collection Of Open Source PS4 Tools all in one Library All Written in C# [HIDE][Hidden Content]] PSN API: This is a python wrapper for the PSN API. [HIDE][Hidden Content]] PS4vibe: PS4 Controller Rumbler Tester Homebrew : [HIDE][Hidden Content]] Orbital: Experimental PlayStation 4 emulator[HIDE]code: [Hidden Content] && dumper : [Hidden Content]] No have tested these tools

Chat Room

Chat Room

Chatroom Rules

No support in chat, open a thread.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.