Sign in to follow this
Followers
0
-
Similar Content
-
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. RAT-el is an open-source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Features
RATelServer:
Multiple Connections
Broadcast commands to all clients
Stores client information in the database
Encryption of data on the network via XOR
Token management system to identify clients
Client:
Encryption of data sent over the network
Startup persistence
Remote command execution via CMD
Remote command execution via Powershell
Encryption of data on the network via XOR
Automatic persistence when running the client
Automatic reconnection
RATelGenerator:
Automatic client compilation
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. Docker for pentest
Docker for pentest is an image with the more used tools to create a pentest environment easily and quickly.
Features
OS, networking, developing and pentesting tools installed.
Connection to HTB (Hack the Box) vpn to access HTB machines.
Popular wordlists installed: SecLists, dirb, dirbuster, fuzzdb, wfuzz and rockyou.
Proxy service to send traffic from any browsers and burp suite installed in your local directory.
Exploit database installed.
Tool for cracking a password.
Linux enumeration tools installed.
Tools installed to discovery services running.
Tools installed to directory fuzzing.
Monitor for Linux processes without root permissions
Zsh shell installed.
Tools installed
Operative system tools
rdate
vim
zsh
oh-my-zsh
locate
cifs-utils
htop
gotop
Network tools
traceroute
telnet
net-tools
iputils-ping
tcpdump
openvpn
whois
host
prips
dig
Developer tools
git
curl
wget
ruby
go
python
python-pip
python3
python3-pip
php
aws-cli
tojson
nodejs
🔪 Pentest tools
Port scanning
nmap
masscan
ScanPorts created by @s4vitar with some improvements
🔍 Recon
Subdomains
Amass
GoBuster
Knock
MassDNS
Altdns
spyse
Sublist3r
findomain
subfinder
spiderfoot
haktldextract
Subdomain takeover
subjack
SubOver
tko-subs
DNS Lookups
hakrevdns
📷 Screenshot
gowitness
aquatone
🕸️ Crawler
hakrawler
Photon
gospider
gau
otxurls
waybackurls
📁 Search directories
dirsearch
Fuzzer
wfuzz
ffuf
Web Scanning
whatweb
wafw00z
nikto
arjun
httprobe
striker
hakcheckurl
CMS
wpscan
joomscan
droopescan
cmseek
Search JS
LinkFinder
getJS
subjs
Wordlist
cewl
wordlists:
wfuzz
SecList
Fuzzdb
Dirbuster
Dirb
Rockyou
all.txt
crunch
Git repositories
gitleaks
gitrob
gitGraber
github-search
GitTools
OWASP
sqlmap
XSStrike
kxss
dalfox
Brute force
crowbar
hydra
patator
medusa
Cracking
hashid
john the ripper
hashcat
OS Enumeration
htbenum
linux-smart-enumeration
linenum
enum4linux
ldapdomaindump
PEASS – Privilege Escalation Awesome Scripts SUITE
Windows Exploit Suggester – Next Generation
smbmap
pspy – unprivileged Linux process snooping
smbclient
ftp
Exploits
searchsploit
Metasploit
MS17-010
AutoBlue-MS17-010
PrivExchange
Windows
evil-winrm
impacket
CrackMapExec
Nishang
Juicy Potato
PowerSploit
pass-the-hash
mimikatz
gpp-decrypt
Reverse shell
netcat
rlwrap
Other resources
pentest-tools from @gwen001
qsreplace from @tomnomnom
Custom functions
NmapExtractPorts from @s4vitar
Other services
apache2
squid
Changelog v0.3.3
feat: dd enum4linx-ng
feat: update enum4linux github repo.
feat: add sqlite3.
feat: upgrade pip for python3.
Hidden Content
Give reaction to this post to see the hidden content.
-
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. What you'll learn
Build a successful blog from scratch, or take your existing blog to the next level
Develop the mindset of a successful blogger
Discover a blogging niche that is both profitable and interesting
Build a beautiful website using WordPress
Develop a system to plan new content, and never run out of ideas again
Understand the importance of effective writing and how to become a better writer
Become familiar with some of the most effective types of blog content
Generate an endless stream of fresh content by repurposing what you've already created
Optimize your website for search engines to drive a consistent stream of free traffic
Get your content in front of people using a variety of free promotion strategies
Grow an email list that allows you to generate traffic and revenue on demand
Build a profitable business around your content and turn your blog into a revenue-generating asset
Requirements
No prior knowledge is necessary. This course starts with the basics before diving into more advanced tips and strategies.
The main requirement is a willingness to commit to the process and put in the work. This course outlines the steps, but it's up to you to take action and do what it takes to make your blog a success.
To get your blog up and running, please note you will need to purchase a domain name and a hosting account. This course will show you exactly how to do that, even if you're new to the process.
Description
UDEMY'S #1 BESTSELLING BLOGGING COURSE — REDESIGNED WITH ALL NEW CURRICULUM FOR 2021 AND BEYOND
"Merrill provides invaluable tips and examples for starting a blog and making it into a career." —CNN
"...the entire process for turning a blog into a bonafide moneymaker." —The Next Web
"Brad is clearly experienced, accomplished and an expert in this subject. His knowledge will be very helpful for those who are able to absorb & implement all of his suggestions and tips." —Leah, Udemy student
"Totally AWESOME course!!!!! You have addressed every aspect of getting started with a new blog, but better yet what it takes to make it a success. I can't wait to get started." —Terry, Udemy student
"Excellent material, well explained, and a talented & experienced instructor who is not afraid to share his opinion on what it does or doesn't work for him." —JP, Udemy student
Brad Merrill has been building things on the web for well over a decade. In 2010, he started a blog about technology and innovation, and in just a couple of years it grew into a large publication with staff and revenue, serving more than half a million monthly readers. His work has been featured on Techmeme and cited by a number of notable blogs and publications, including the Wall Street Journal.
In this course, Brad condenses more than ten years of trial and error into a simple blueprint designed to help you build a successful blog.
You'll learn all the essentials, including:
The mindset of a successful blogger
How to build a WordPress site
How to write amazing blog content that readers will love and share
How to promote your content to ensure people actually see it
How to build and leverage an email list to generate traffic and revenue on demand
How to turn your blog into a business that generates revenue
Why would you want to build a blog? Well, there are many different motivations, but here are a few of the most common:
Build a business: A blog can be the center of a low-overhead, location-independent, lucrative business. There has never been a better time to do this—the Internet has made it cheaper and easier than ever before for anyone to start a business.
Grow an existing business: Content marketing is one of the best ways to drive your business forward, and a blog is a tried and true format. Many of the world's biggest companies and brands are now using digital content to market their products and services, so you'll be in great company if you do the same.
Showcase your expertise: If you want to position yourself as a thought leader or expert, blogging is an excellent way to do it. A blog can be a powerful asset if you're trying to build a personal brand, get a job, sell services, or launch a career in public speaking.
Build Relationships: Blogging is a great way to become an active and influential member of your community, which can help you build relationships with people you want to reach.
If you're thinking of starting a blog this year, there's never been a better time. This course will walk you through the entire process—setting up WordPress, writing stellar content, promoting that content, building an email list, and implementing a revenue model to turn your blog into a business. It's all here.
Who this course is for:
This course is designed for students with varying levels of experience. Whether you're just getting started or looking for ways to take your blog to the next level, this course is for you.
Hidden Content
Give reaction to this post to see the hidden content.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. Password Protect Any Software & EXE File
Stop Viruses that Modify Your Software
Does Not Make Any Changes to EXE
Lock With Secure Cryptographic Algorithms
Eay to Use & Support Command Line
What Does Gilisoft EXE Lock Do?
Most applications don’t come with user restrictions and this becomes a security flaw when two or more people are using the same computer (There are some applications on my computer that I don't want people to use, and I can't put a password on Windows due to certain reasons.). Password protecting the executable files is just another way you can heightened security in a shared environment.
What I need is a software that works like AppLock on Android or something, which is basically asking you for password every time you open it. Is such an application available? GiliSoft Exe Lock can lock any programs on your local computer, a person can not run the password locked programs without a password. For example, if you do don't want other persons to use your tax preparation software, personal finance or other programs you like, you simply need to run this application.
Hidden Content
Give reaction to this post to see the hidden content.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. English | November 4, 2019 | ISBN: 1705492703 | 177 pages | Rar (PDF, AZW3) | 5.10 MB
Do you want to learn about how to hack using Kali Linux within a short time span? Do you want to learn about how to perform an actual attack and become a professional hacker?
This handbook will suit your needs, and you will not only learn about Hacking Tools for Computers, but you will also be accorded some guidance on how you can successfully launch your first attack using Kali Linux.
By gaining some insight into Hacking Tools for Computers through this handbook, you will also realize that you have saved on time and other resources, depending on your learning needs.
Hidden Content
Give reaction to this post to see the hidden content.
Hidden Content
Give reaction to this post to see the hidden content.
-