Monthly Archives: April 2017

Home » Archives for April 2017

ShodanHat – Search For Hosts Info With Shodan

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Search For Hosts Info With Shodan.

Dependencies
You need to install shodan with pip install shodan or easy_install shodan.
You need to install python-nmap with pip install python-nmap.
You need to set your API Key in the ‘constantes.py’ file.

Options
-h, –help […]

By |April 27th, 2017|Papers|

IR-RESCUE – A WINDOWS BATCH SCRIPT TO COMPREHENSIVELY COLLECT HOST FORENSIC DATA DURING INCIDENT RESPONSE.

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

IR-RESCUE is a Windows Batch script that collects a myriad of forensic data from 32-bit and 64-bit Windows systems while respecting the order of volatility.
It is intended for incident response use at different stages in the […]

By |April 27th, 2017|Papers|

REGA & REGEX : FORENSIC AND REGISTRY ANALYZER

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

REGA is the forensic tool performing collection and analysis of the windows registry hives. (GUI application)
RegEX is a console application for collecting registry hive files.
Supported platforms
Windows (written in C/C++ and MFC)
Platform : Windows
Features
Target OS
Windows NT / […]

By |April 27th, 2017|Papers|

MARA FRAMEWORK V0.2(BETA) – MOBILE APPLICATION REVERSE ENGINEERING & ANALYSIS FRAMEWORK.

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Ken-Pachi / August 12, 2016 / Comments Off on Mara framework v0.2(beta) – Mobile Application Reverse Engineering & Analysis Framework. / Android Tools, Anti Malware/Virus – Malware Analysis, Encryption, Framework, Registry Analysis, Security Tools
Changelog v0.2(beta):
* Adding […]

By |April 26th, 2017|Papers|

VOLATILITY V2.6 – AN ADVANCED MEMORY FORENSICS FRAMEWORK.

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely […]

By |April 26th, 2017|Papers|

creak – Poison, Reset, Spoof, Redirect MITM Script

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Performs some of the most famous MITM attack on target addresses located in a local network. Among these, deny navigation and download capabilities of a target host in the local network performing an ARP poison attack […]

By |April 26th, 2017|Papers|

GIANT_BACKDOOR – WINDOWS BACKDOOR DIAGNOSTIC TOOL.

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Detect and uninstall the sticky keys, utility manager, narrator, on-screen keyboard, magnifier, and display switch backdoors, which allows unauthorized access to a system level command prompt at the login screen. Checks if setch.exe, utilman.exe, narrator.exe, osk.exe, […]

By |April 25th, 2017|Papers|

Brutal Toolkit – Create various Payload, PowerShell Attack, Virus Attack and Launch Listener for a HID

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Brutal is extremely useful for executing scripts on a target machine without the need for human-to-keyboard interaction ( HID -ATTACK ) .When you insert the device, it will be detected as a keyboard, and using the […]

By |April 25th, 2017|Papers|

Forward HTTP/S Traffic To Proxy Instance Via Vproxy

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan
If you are familiar with mobile penetration testing and you did one before, you probably came across this kind of situation when you want to intercept the application HTTP or HTTPS traffic using your favourite proxy […]

By |April 25th, 2017|Papers|

Exploiting Windows Credentials In Memory

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

PowerMemory is a PowerShell based tool to exploit Windows credentials present in files and memory, it levers Microsoft signed binaries to hack Windows.

The method is totally new. It proves that it can be extremely easy to […]

By |April 14th, 2017|Papers|