Papers

/Papers

What Are DLL Files? Can I Download DLL Files From Internet To Fix Windows Errors?

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

In Windows-based PCs, very often we come across DLL file errors that don’t allow some software to run. We get error messages telling us that some particular .DLL file is missing. To solve this issue, we […]

By |December 3rd, 2016|Papers|

Here is How to Enable System Restore in Windows 10

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

The System restore feature is the one that lets you go back in time and undo the changes made. Mysteriously, this feature is disabled in Windows  10 by default. We ae not sire tif this is an […]

By |December 3rd, 2016|Papers|

Vproxy – Forward HTTP/S Traffic To Proxy Instance

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Vproxy is a python script tool which configures a PPTP VPN server that will redirect HTTP/HTTPS traffic to your proxy instance host.
System Requirements:

Kali Linux or any Linux distribution

Installation:
pip install termcolor
How to use:
Step 1: Setup VPN […]

By |November 30th, 2016|Papers|

F-Scrack – Bruteforce Tool With Mutli-Protocol Support

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

F-Scrack is a single file bruteforcer supports multi-protocol, no extra library requires except python standard library, which is ideal for a quick test.
Supported protocol:

FTP
MySQL
MSSQ
MongoDB
Redis
Telnet
Elasticsearch
PostgreSQL.

Compatible Operating system:

OSX
Linux
Windows
Python 2.6+

How to run the command:
python F-Scrack.py -h […]

By |November 27th, 2016|Papers|

slowloris – DoS tool using low bandwidth

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Slowloris is an HTTP Denial of Service attack tool that affects threaded servers. It is developed using python language. The bot starts to make lots of HTTP requests and then sends headers periodically ( every 15 seconds ) to keep the connections open. It never […]

By |November 27th, 2016|Papers|

WinMACSpoofer – Spoofing tool for Windows

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

WinMACSpoofer is a open source tool which helps to spoof the MAC address and host name.

How to use:
Run the tool in “administrator mode” for the functions to work properly.

Step 1: Set a new Random MAC address.

Press the randomize button to generate a random MAC […]

By |November 27th, 2016|Papers|

WAFNinja – A Tool To Bypass WAF

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

WAFNinja is a CLI tool written in Python. It is the best tool for penetration testers to bypass a WAF by automating steps necessary for bypassing input validation. The tool was created with the objective to be easily extendable, simple to use and usable in […]

By |November 27th, 2016|Papers|

Radium Keylogger – A Keylogger Using Python

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Python keylogger with multiple features.
Requirements:

Install PyHook
Install PyWin32
Install Microsoft Visual C++ Compiler for Python
Install PyInstaller

Install and Use:
Step 1: Download the libraries if you are missing any.
Step 2: Set the Gmail username and password and remember to check allow connection from less secure […]

By |November 27th, 2016|Papers|

OpenDoor – OWASP Directory Access Scanner

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

OpenDoor is an open-source software that scans the site directories and find all possible ways to login, empty directories and entry points. Scans conducted in the dictionary that is included in this application.
System Requirements:

Python 2.7.x

Installation command:
sudo pip install -r requirements.txt
Features:

multithreading
filesystem log
detect redirects
[…]

By |November 27th, 2016|Papers|

OpenStego: A Steganography Application Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

OpenStego is an open-source software which circulated under the terms of the GNU(General Public License v2.0.)
As well as it is a Steganography application that offers two main functionalities:

Data Hiding: It can hide any data within a cover file such as – images.
Watermarking: Watermarking […]

By |November 17th, 2016|Papers|