Posts

Showing posts with the label security

onionshare: Securely and anonymously share a file of any size

Image
What is OnionShare? OnionShare lets you securely and anonymously share files of any size. It works by starting a web server, making it accessible as a Tor onion service, and generating an unguessable URL to access and download the files. It doesn't require setting up a server on the internet somewhere or using a third party file sharing service. You host the file on your own computer and use a Tor onion service to make it temporarily accessible over the internet. The other user just needs to use Tor Browser to download the file from you. SERVER CLIENT READ MORE TRANSFER FILES BETWEEN ANDROID AND LINUX WITHOUT SHAREIT AND XENDER How to Use Open OnionShare, drag and drop files and folders you wish to share into it, and click Start Sharing. After a moment, it will show you a .onion URL such as  http://asxmi4q6i7pajg2b.onion/egg-cain . This is the secret URL that can be used to download the file you're sharing. Send this URL to the person you're sending the files to. If the fil...

Track the IP address of your email sender

Image
We all may get lots of fraud and spam emails on gmail and on other email sites and these days we are  getting these types of email too much.So,i am here to share you the way to get the information about these email sender by getting their IP address.So follow these simple steps given below and you can get the IP address of your email sender . STEP 1 >  Go to  Gmail then open the mail then click on more then select 'Show original' STEP 2> A source page of the mail will be open .Now search for "Received: from" then you will get the ip address of the sender on the same line where you will get your word that you searched for. STEP 3>Now its time to get the information of the ip address,go to  traceip.net  then enter the ip address of the sender.  STEP 4>Now click on "whois" THATS ALL,you will get the maximum detail of the email sender. If you like the post so please share this with you friends :) MORE POSTS BY SHAQUIB THE FSOCIETY RANSOMWARE FROM MR...

DDoS attack detector

Image
DDoS attack detector Ddosdetector System - a flexible tool for analyzing network traffic and automation of the process of protection against DDoS attacks. The system is based on the framework,  Luigi Rizzo   netmap  and is designed to work with a large volume of traffic (10GB / sec and more) without loss of performance. The system is written in C++ (Standard 11) using  STL  and  Boost (1.55) . Writing and assembling was done on  Ubuntu 12.04.5 LTS  and compiler  g++4.8 . For static analysis and research style blunders used  cppcheck  version 1.73. InfluxDB can be used for monitoring and collection of statistics. code of this Grafana dashboard in ./docs/INFLUXDB.md file Principle of operation The daemon runs on the SPAN interface (this interface is mirrored all traffic protected network) and starts to "listen" all traffic. The resulting traffic is passed through a set of rules. Each rule set of features by which the package is tested...

Make your own WiFi hotspot program using Batch Programming

Image
Most of us have WiFi in our laptop  computer but when we want to share our wifi with our friends we spend money to buy software which create hostpot network on your laptop.But now you don't need to buy or waste money for these types of software, you can create your own WiFi Hotspot  network by using a batch program,I will tell you how can you do this,so follow the steps below STEP 1: Open your notepad STEP 2: Copy and paste the code to your notepad given below ___________________________________________________________________ @echo off if not exist c:\users\%username% goto err1 :main cls echo. echo. echo Wi-Fi Hotspot Compatible with Windows 8 -  echo By Tekspot(techingspot.tk) echo -- echo. echo. echo. echo 1. Create a Hotspot echo 2. Show Network Settings echo 3. Show Drivers echo 4. Start Network echo 5. Stop Network echo 6. Help echo 7. About echo 8. Quit echo. set /p select=Enter the number of your choice: if %select% == 1 goto :create if %select% == 2 goto :shownet...

fsociety-ransomware from MrRobot

Image
This is Jester ransomware like, in Mr Robot movie (coded by Darlene S1E2,3), Please beware warning, after start you can't recover the files (In movie, the public key is not shared). IMPORTANT NOT FULLY STEP COMPLETED On movie Required lib : Crypto++ CURL G++ flags used for test g3 ggdb O0 Wall Wextra Wno-unused lcryptopp lcurl Ransomware Step Initial File listing File parser Encrypt files source with AES Library Change filename with filename+.locked Send to jester C&C (Number file...) Ask reward & setup jester pages (For security reason the ransomware crypt only .txt but you can change on c++ file) please remember this is just a PoC the ransomware is not stable is just for fun! DISCLAIMER This is Jester ransomware like, in Mr Robot movie (coded by Darlene S1E2,3), Please beware warning, after start you can't recover the files (In movie, the public key is not shared). Please don't use this malware on personal computer. This project is just a wink of mr robot series. ...

GET 1000 HACKING TRICKS COLLECTION FOR FREE

Image
Get 1000 hacking tricks collections ,these are the best and popular hacking tricks . These tutorials are supported by windows vista, seven, and xp (still lots of people using this os) you will also get some knowledge article related to networking, how to become a hacker, and lots of stuffs related to hacking. MORE POSTS FOR YOU: DISABLE MANY RISKY FEATURES OF WINDOWS WITH HARDEN TOOLS THIS TUTORIAL INCLUDES: 1 Ethical hacking tricks 2 Windows hacking tricks 3 Registry hacking tricks 4 Cryptography and more                              NOW FREE DOWNLOAD 1000 HACKING TRICKS AND TIPS                                                             DOWNLOAD NOW!! MORE POSTS TO BOOST THE HACKER IN YOU: 1.  HACK WIFI PASSWORDS WITH YOUR WINDOWS MACHINE 2.  TOP FREE T...

Top tools for Website Hacking and DDOS attack

Image
Get these Bunch of tools for pentesting your website for DOS and  Bug finding. I have included 55 tools that will best suits penetration tester, these tools could help them to keep their website more secure. So download these tools and enjoy Hacking  DOWNLOAD FOR YOU MORE POSTS basikRAT PYTHON REMOTE ACCESS TROJAN GUIDE FREE Follow Shaquib izhar to get updated with all my latest post :  FOLLOW 

Check you website for Vulnerability and save it from getting hacked

Image
Today i will show you a easiest way to check your site for XSS (cross site scripting), RFI (Remote file inclusion). These are the popular way to hack into web server or rooting them. So we have a program which is based on Perl.To run this program we need Perl so you have to install it on your computer so first download Perl from here :   DOWNLOAD YOU MAY LIKE: baSicrat REMOTE ACCESS PYTHON TROJAN: SEE HOW TO USE IT OK now after installing  Perl you have to go to the program's website and copy that code which you will get on that website then paste it to your notepad etc, etc but to save time i have already done this for you and saved the program to my cloud drive so just download the program from here :  DOWNLOAD Please note i am only sharing this program. Credits and thanks to Author for this program Now after downloading the program you have to just run the it  (as usual you do) and follow below steps STEP 1: Choose number 4 to check for both XSS and LFI  STEP...

basikRAT python Remote Access Trojan

Image
This is a cross-platform Python 2.x Remote Access Trojan (RAT), basicRAT was created to maintain a clean design full-featured Python RAT. Currently a work in progress and still being actively hacked on. Disclaimer: This RAT is for research purposes only, and should only be used on authorized systems. Accessing a computer system or network without authorization or explicit permission is illegal. Features Cross-platform (Windows, Linux, and macOS) AES-256 encrypted C2 with D-H exchange Accepts connection from multiple clients Command execution Standard utilities (cat, ls, pwd, unzip, wget) System survey Self-destruct Primitive port scanning Client reconnect Usage $ python basicRAT_server.py --port 1337 ____ ____ _____ ____ __ ____ ____ ______ . , | \ / |/ ___/| | / ]| \ / || | (\;/) | o )| o ( \_ | | / / | D )| o || | oo \//, _ | || |\__ | | |/ / | / | ||_| |_| ,/_;~ \, / ' | O || ...