Jump to content

Search the Community

Showing results for tags 'python'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. Creating a Command and Control Server with Backdoor 0.0 | (0 ratings) | 1 student | Author: Rausson Gouveia Course Duration: 5 sections • 13 lectures • 2h 29m total length What you'll learn: Python logic Advanced python You will learn about client/server connection creating a command and control server Requirements: Python language experience Description: Hello, I'm here to introduce you to my newest project: Creating a Backdoor Command and Control Server using python.do you know what a Trojan Access Remote is? Not ? So here, in this course, we are going to learn what it is and create our own.This course is for all those who want to learn what a RAT Trojan access Remote is and how dangerous this tool is in the hands of those who know how to use it, an extremely important tool for red teams and also used by cyberterrorists.This course has 3 modules, where we will learn about what a RAT is, then we will create our own server and then our client.And what can we do with this RAT? It's very simple, we are going to use the server to download files, upload files and also access the terminal of our viima.This server that we are going to create is managed, being able to receive several connections and a list of victims, and we will be able to choose which victim we want to manage by using the ID.What we need ? A computer with an operating system, whether linux or windows, in the class I will be using linux and we will also use python2 and python3.All codes used in this class are commented and made available to all our students.Here's an example of using our RAT#my server waiting for connection$shell>when a victim connects, I will be able to view it on my server using the targets command#after I use the command "targets" the server will show me all my connections.$shell>targets(Victim_0)(vimit_1)(...............)#Now I can choose which victim I can manage, I will choose #victim 0, in this case I will type "target_0"$shell>target_0#Ok, now I can manage victim 0, now I can upload and download file for victim and access the terminal.Liked ? Can you imagine what you can do with this knowledge? remembering that this project has an academic purpose, like all cybernetic weapons on the internet. Who this course is for: Everyone who wants to learn about network connections [Hidden Content] [hide][Hidden Content]]
  2. Modular visual interface for GDB in Python. This comes as a standalone single-file .gdbinit which, among the other things, enables a configurable dashboard showing the most relevant information during the program execution. Its main goal is to reduce the number of GDB commands issued to inspect the current program status allowing the programmer to focus on the control flow instead. Features Single GDB init file. Write the dashboard to the main GDB console or to an external file/TTY. Interaction with GDB using the native Python API. Several default modules are included to address the most basic needs: source code, assembly, registers, etc.). User-defined modules can be easily developed by extending a Python class. Additional configuration files (both GDB and Python) are read from ~/.gdbinit.d/. Fully stylable user interface and dynamic command prompt. Optional syntax highlighting using the Pygments Python library. No GDB command has been redefined, instead, all the features are available as subcommands of the main dashboard command. [hide][Hidden Content]]
  3. About BirDuster is a Python based knockoff of the original DirBuster. BirDuster is a multi threaded Python application designed to brute force directories and files names on web/application servers. Often is the case now of what looks like a web server in a state of default installation is actually not, and has pages and applications hidden within. [hide][Hidden Content]]
  4. Description Have you ever wanted to learn Python from an Ethical Hacking point of view? Maybe you already have basic coding skills or maybe you’re completely new to programming. In either case, sometimes you’ll find yourself on a penetration test with limited tooling. In cases like these you can demonstrate immense value to the client by building your own toolkits. In this course you will build offensive tooling in Python 3 from scratch. You will learn how to setup your coding environment in VMWare Workstation, Kali Linux and VSCode. We’ll quickly configure and customize your development environment and then code our first hacking tool: an email scraper. The tool will accept a URL as input from the user and then spider links and scrap emails using regex and the BeautifulSoup library. It’s going to be a lot of fun (especially when you make it work on your own!) Whether you’re coming from C#, C++ or you have zero programming experience, this course will hold you by the hand and walk you through a modern coding approach. Everything is explained one step at a time and the author is readily available for questions. So what are you waiting for? Let’s jump in and start now! Who this course is for: Beginner Python Developers Ethical Hackers Penetration Testers Cyber Security Analysts Requirements Laptop with internet connection [Hidden Content] [hide][Hidden Content]]
  5. [Hidden Content]
  6. Description What is ethical hacking? Ethical hacking, also known as penetration testing or pen testing, is legally breaking into computers and devices to test an organization’s defenses. It’s among the most exciting IT jobs any person can be involved in. You are literally getting paid to keep up with the latest technology and get to break into computers without the threat of being arrested. The Usefulness of Python in Cyber Security Python is an advantageous programming language for cyber security because it can perform many cyber security functions, including malware analysis, scanning, and penetration testing functions. It is user-friendly and has an elegant simplicity, making it the perfect language choice for many cyber security professionals. Python has been at the forefront for many years. It is a general-purpose, server-side scripting language that has been used for thousands of security projects. Everything from testing microchips to building video games with PyGame, Python is the most sought after programming language for its power-packed capabilities. Using Python’s base programming, any of the following can be done without using any other third-party tools Web server fingerprinting Simulation of attacks Port scanning Website cloning Load generation and testing of a website Creating intrusion detection and prevention systems Wireless network scanning Transmission of traffic in the network Accessing mail servers. Conclusion A lot of the reasons mentioned above and several others make programmers prefer Python over any other programming language. Using Python by cyber security professionals over any other programming language is also common due to factors such as better respond time, user-friendly data structure and security. Who this course is for DevSecOps Engineers Ethical Hackers Pen-testers Cyber Security Engineers Requirements Eager to Learn and Patience [hide][Hidden Content]]
  7. PyShell is Multiplatform Python WebShell. This tool helps you to obtain a shell-like interface on a web server to be remotely accessed. Unlike other webshells, the main goal of the tool is to use as little code as possible on the server side, regardless of the language used or the operating system of the server. Thanks to this, you can use different types of shells (aspx, php, jsp, sh, py...) both in Windows and Linux, with command history, upload and download files and even, moving through directories as if it were a standard shell. [hide][Hidden Content]]
  8. Features 17 HTTP headers. Multithreading. JSON export with --json outputfile.json. Auto-detecting most successfull bypasses. [hide][Hidden Content]]
  9. CrackerJack is a Web GUI for Hashcat developed in Python. Architecture This project aims to keep the GUI and Hashcat independent. In a nutshell, here’s how it works: User uploads hashes select wordlist/rules/mask etc, and clicks “start”. Web server spawns a new screen. Generates the hashcat command based on the settings. Runs the command on the screen. Monitors the screen’s output, parses it and displays it in the GUI. This allows CrackerJack to be future-proof as it ties to the input/output of Hashcat. Also, if the GUI is not working for whatever reason, hashcat will keep running. Features Minimal dependencies Uses sqlite3, screen, and hashcat. Complete hashcat session management. Start/stop/pause/restore running sessions. Terminate cracking jobs after a specific date/time. Web interface for mask generation (?a?l?u). Web Push notifications when a password is cracked. Swagger 2.0 API. Create wordlists from already cracked passwords and feedback into the cracking session. Session history to track which attacks you have already performed. Multi-user support (local and/or LDAP). Wordlist/Mask/Rule support. Multiple theme support (Bootswatch). Straight-forward setup. The entire configuration is via the GUI. No need for manually editing config files. Run locally on Linux and Windows (WSL). Install on a server using ansible scripts (Ubuntu 14/16/18 and CentOS 7/8). Easy backups – all user data are in the ./data directory. Troubleshoot sessions via SSH. Limitations Not a solution for queueing jobs – it’s only for on-demand password cracking. Not meant to be a replacement for command-line usage. It’s complimentary and only supports basic and most common cracking tasks. Will not install any GPU drivers. The main assumption is that you have a cracking rig already set up and are looking for a Web GUI. Wordlists and rules should already be present in the system. Changelog v1.1.2 [New] Added “Test Connection” feature to LDAP settings. [hide][Hidden Content]]
  10. Diaphora is a plugin for IDA Pro that aims to help in the typical BinDiffing tasks. It’s similar to other competitor products and open sources projects like Zynamics BinDiff, DarunGrim, or TurboDiff. However, it’s able to perform more actions than any of the previous IDA plugins or projects. Diaphora is distributed as a compressed file with various files and folders inside it. The structure is similar to the following one: diaphora.py: The main IDAPython plugin. It contains all the code of the heuristics, graphs displaying, export interface, etc… jkutils/kfuzzy.py: This is an unmodified version of the kfuzzy.py library, part of the DeepToad project, a tool and a library for performing fuzzy hashing of binary files. It’s included because fuzzy hashes of pseudo-codes are used as part of the various heuristics implemented. jkutils/factor.py: This is a modified version of a private malware clusterization toolkit based on graphs theory. This library offers the ability to factor numbers quickly in Python and, also, to compare arrays of prime factors. Diaphora uses it to compare fuzzy AST hashes and call graph fuzzy hashes based on small-primes-products (an idea coined and implemented by Thomas Dullien and Rolf Rolles first, authors or former authors of the Zynamics BinDiff commercial product, in their “Graph-based comparison of Executable Objects – Zynamics” paper). Pygments/: This directory contains an unmodified distribution of the Python pygments library, a “generic syntax highlighter suitable for use in code hosting, forums, wikis or other applications that need to prettify source code”. [hide][Hidden Content]]
  11. FindYara Use this IDA python plugin to scan your binary with Yara rules. All the Yara rule matches will be listed with their offset so you can quickly hop to them! Using FindYara The plugin can be launched from the menu using Edit->Plugins->FindYara or using the hot-key combination Ctrl-Alt-Y. When launched the FindYara will open a file selection dialogue that allows you to select your Yara rules file. Once the rule file has been selected FindYara will scan the loaded binary for rule matches. All rule matches are displayed in a selection box that allows you to double click the matches and jump to their location in the binary. [hide][Hidden Content]]
  12. Diaphora is a plugin for IDA Pro that aims to help in the typical BinDiffing tasks. It’s similar to other competitor products and open sources projects like Zynamics BinDiff, DarunGrim, or TurboDiff. However, it’s able to perform more actions than any of the previous IDA plugins or projects. Diaphora is distributed as a compressed file with various files and folders inside it. The structure is similar to the following one: diaphora.py: The main IDAPython plugin. It contains all the code of the heuristics, graphs displaying, export interface, etc… jkutils/kfuzzy.py: This is an unmodified version of the kfuzzy.py library, part of the DeepToad project, a tool and a library for performing fuzzy hashing of binary files. It’s included because fuzzy hashes of pseudo-codes are used as part of the various heuristics implemented. jkutils/factor.py: This is a modified version of a private malware clusterization toolkit based on graphs theory. This library offers the ability to factor numbers quickly in Python and, also, to compare arrays of prime factors. Diaphora uses it to compare fuzzy AST hashes and call graph fuzzy hashes based on small-primes-products (an idea coined and implemented by Thomas Dullien and Rolf Rolles first, authors or former authors of the Zynamics BinDiff commercial product, in their “Graph-based comparison of Executable Objects – Zynamics” paper). Pygments/: This directory contains an unmodified distribution of the Python pygments library, a “generic syntax highlighter suitable for use in code hosting, forums, wikis or other applications that need to prettify source code”. Changelog v2.0.6 BUG: Do not crash when we cannot analyse one Diaphora SQLite database. BUG: Diaphora was incorrectly searching the pattern ‘{}’ instead of ‘[]’ for empty list field values. Fix for #219. GUI: When a reverser uses the “Diff pseudo-code” option and both codes are equal, show a warning message, but also show the diffing. HEUR: In heuristic “Call Address Sequence” use also the “Partial results” when the function name is the same. HEUR: Added heuristic “Same RVA”. Only matches with a minimum ratio of 0.7 will be considered. HEUR: Removed the “Slow” flag from the heuristic “Same Rare Constant”. HEUR: Use the 3 calculated fuzzy hashes in heuristic “Pseudo-code Fuzzy Hash”. HEUR: Moved heuristic “Similar Pseudo-code and Names” from the probably unreliable category to normal. HEUR: Removed wrong heuristics “Similar Small Pseudo-codes” and “Equal Small Pseudo-codes” because they caused a lot of false positives (heuristics for finding matches tend to fail with small functions, and these were no exception). Also, applied suggestion for issue #220. [hide][Hidden Content]]
  13. Cerbrutus Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB, HTTP(s) POST, HTTP(s) GET, HTTP BASIC AUTH Thanks to @0dayctf, Rondons, Enigma, and 001 for testing and contributing [hide][Hidden Content]]
  14. Features Fast bruteforce Low RAM and CPU usage Open-Source Python [hide][Hidden Content]]
  15. pyMalleableC2 A Python interpreter for Cobalt Strike Malleable C2 profiles that allows you to parse, modify, build them programmatically and validate syntax. Supports all of the Cobalt Strike Malleable C2 Profile grammar starting from Cobalt Strike version 4.3. It’s not backwards compatible with previous Cobalt Strike releases. What are the differences between pyMalleableC2 and other projects of this nature? Parses profiles with Lark using eBNF notation. This approach is a lot more robust then user-defined regexes, templating engines, or similar methods. Turns profiles into an Abstract Syntax Tree (AST) which can then be reconstructed back into source code. Because of the above, pyMalleableC2 allows you to build profiles programmatically or modify them on the fly. Allows you to validate the syntax of Malleable C2 profiles (Does not perform runtime checks, see the warning below.) It has AI in the form of a lot of if statements. [hide][Hidden Content]]
  16. peda PEDA – Python Exploit Development Assistance for GDB Key Features: Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. Add commands to support debugging and exploit development (for a full list of commands use peda help): aslr — Show/set ASLR setting of GDB checksec — Check for various security options of binary dumpargs — Display arguments passed to a function when stopped at a call instruction dumprop — Dump all ROP gadgets in the specific memory range elfheader — Get headers information from debugged ELF file elfsymbol — Get non-debugging symbol information from an ELF file lookup — Search for all addresses/references to addresses which belong to a memory range patch — Patch memory start at an address with string/hexstring/int pattern — Generate, search or write a cyclic pattern to memory procinfo — Display various info from /proc/pid/ pshow — Show various PEDA options and other settings pset — Set various PEDA options and other settings readelf — Get headers information from an ELF file ropgadget — Get common ROP gadgets of binary or library ropsearch — Search for ROP gadgets in memory searchmem|find — Search for a pattern in memory; support regex search shellcode — Generate or download common shellcodes. skeleton — Generate python exploit code template vmmap — Get virtual mapping address ranges of section(s) in debugged process xormem — XOR a memory region with a key Changelog v1.2 Bug fixes [hide][Hidden Content]]
  17. CrackerJack is a Web GUI for Hashcat developed in Python. Architecture This project aims to keep the GUI and Hashcat independent. In a nutshell, here’s how it works: User uploads hashes select wordlist/rules/mask etc, and clicks “start”. Web server spawns a new screen. Generates the hashcat command based on the settings. Runs the command on the screen. Monitors the screen’s output, parses it and displays it in the GUI. This allows CrackerJack to be future-proof as it ties to the input/output of Hashcat. Also, if the GUI is not working for whatever reason, hashcat will keep running. Features Minimal dependencies Uses sqlite3, screen, and hashcat. Complete hashcat session management. Start/stop/pause/restore running sessions. Terminate cracking jobs after a specific date/time. Web interface for mask generation (?a?l?u). Web Push notifications when a password is cracked. Swagger 2.0 API. Create wordlists from already cracked passwords and feedback into the cracking session. Session history to track which attacks you have already performed. Multi-user support (local and/or LDAP). Wordlist/Mask/Rule support. Multiple theme support (Bootswatch). Straight-forward setup. The entire configuration is via the GUI. No need for manually editing config files. Run locally on Linux and Windows (WSL). Install on a server using ansible scripts (Ubuntu 14/16/18 and CentOS 7/8). Easy backups – all user data are in the ./data directory. Troubleshoot sessions via SSH. [hide][Hidden Content]]
  18. What you'll learn Learn Python from scratch so you are able to write your own tools for ethical hacking Learn Python Basics Learn Python Intermediate Learn Python: Error Handling Learn Python: File I/O Make Email Scraper Tool In Python Make Port Scanner Tool In Python Make Backdoor In Python Make Login Brute-force Tool in Python Make Directory Discovery Tool in Python Requirements Eager to Learn and Patience !!! Description Ethical hacking, also known as penetration testing or pen testing, is legally breaking into computers and devices to test an organization's defenses. White Hat is commonly employed or contracted to carry out an attack under explicit permission and clear-cut boundaries. The goal of white hats’ work is to research, find and test vulnerabilities, exploits and viruses in their defined targets. Gray Hat as the name suggests, are more ambiguous in their definition. Their work may be classified as leaning toward good or bad on the spectrum depending on your perspective. Black Hats cause great intentional damage and profit at the expense of their targets. These hackers are responsible for directing attack trends and inversely stimulating work demands in the white-hat market through harmful, illegal online activities. In This Course you will learn all of the Following: Learn Python from scratch so you are able to write your own tools for ethical hacking Learn Python Basics Learn Python Intermediate Learn Python: Error Handling Learn Python: File I/O Make Port Scanner Tool In Python Make Backdoor In Python Make Login Brute-force Tool in Python Make Directory Discovery Tool in Python Make Email Scraper Tool In Python Who this course is for: Anybody interested in learning ethical hacking and penetration testing Anybody interested in learning python and ethical hacking Cyber Security Engineers Ethical Hackers Pentesters System Administrators Network Engineers IT Security Managers [Hidden Content] [hide][Hidden Content]]
  19. What you'll learn Ethical Hacking Python Programming Penetration Testing Network Security Port and Vulnerability Scanning SSH and FTP Attacks Password Cracking Sniffers, Flooders and Spoofers DNS Spoofing Network Analysis Requirements A basic understanding of ethical hacking related concepts. An eager and open mind! Description If you would like to master ethical hacking, you are going to LOVE our bestselling Python course! Learn ethical hacking and penetration testing while working on practical Python coding projects. We will cover the following topics in this course: Introduction and setup Port and vulnerability scanning SSH and FTP attacks Password cracking Sniffers, flooders and spoofers DNS spoofing Network analysis Coding a multi-functioning reverse shell Keyloggers Command and control center Website penetration testing [Hidden Content] [hide][Hidden Content]]
  20. In this video we are gonna talk about how to extract the code from python executables. [Hidden Content]
  21. Easy Python Decompiler is python bytecode decompiler, decompiles pyc & pyo files. Python version 1.0 to 3.4 are supported. This project is based two excellent decompiler "Uncompyle2" & "Decompyle++" No python installation is necessary for decompiling! You can decompile a single file or a whole directory. Unicode filenames are supported.. Features Decompiles python 1.0 - 3.4 Nice GUI, no fiddling on a command line No python installation needed. New Decompiler engine is blazing fast. Unicode filename support. [hide][Hidden Content]]
  22. What you’ll learn Instagram Automation Build a Bot with Python Requirements Basic Linux Command Line Python Basics An Instagram account Description Instagram is the fastest-growing social network, with 1 billion monthly users. It also has the highest engagement rate. To gain followers on Instagram, you’d have to upload engaging content, follow users, like posts, comment on user posts and a whole lot. This can be time-consuming and daunting. But there is hope, you can automate all of these tasks. In this course, we’re going to build an Instagram bot using Python to automate tasks on Instagram. We will look at using Python to upload images or videos, like posts, comment on posts and a whole lot. Who this course is for: Python developer who wants to learn Instagram Automation [hide][Hidden Content]]
  23. ADBSploit A python-based tool for exploiting and managing Android devices via ADB. Functionalities v0.2 Added: Fixed setup and installation Extract Contacts Extract SMS Send SMS Recovery Mode Fastboot Mode Device Info Kill Process v0.1 List Devices Connect Devices TCPIP Forward Ports Airplane Managment Wifi Managment Sound Control List/Info Apps WPA Supplicant Extraction Install/Uninstall Apps Shutdown/Reboot Logs Start/Stop/Clear Apps Show Inet/MAC Battery Status Netstat Check/Unlock/Lock Screen Turn On/Off Screen Swipe Screen Screencapture Send Keyevent Open Browser URL Process List Dump Meminfo/Hierarchy [hide][Hidden Content]]
  24. Python module for viewing Portable Executable (PE) files in a tree-view using pefile and PyQt5. Can also be used with IDA Pro to dump in-memory PE files and reconstruct imports. Features Standalone application and IDAPython plugin Supports Windows/Linux/Mac Rainbow PE ratio map: High-level overview of PE structures, size and file location Allows for fast visual comparison of PE samples Displays the following PE headers in a tree view: MZ header DOS stub Rich headers NT/File/Optional headers Data directories Sections Imports Exports Debug information Load config TLS Resources Version information Certificates Overlay Extract and save data from: DOS stub Sections Resources Certificates Overlay Send data to CyberChef VirusTotal search of: File hashes PDB path Timestamps Section hash/name Import hash/name Export name Resource hash Certificate serial Standalone application; Double-click VA/RVA to disassemble with capstone Hex-dump data IDAPython plugin: Easy navigation of PE file structures Double-click VA/RVA to view in IDA-view/hex-view Search IDB for in-memory PE files; Reconstruct imports (IAT + IDT) Dump reconstructed PE files Automatically comment PE file structures in IDB Automatically label IAT offsets in IDB [hide][Hidden Content]]

Chat Room

Chat Room

Chatroom Rules

No support in chat, open a thread.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.