Extreme Hacking

We work in Dark, to serve the Light

Extreme Hacking /

Stay anonymous while hacking online using TOR and Proxychains

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

TOR
Tor is software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy. It gives you access to the dark web.

Dark web is nothing […]

By |May 4th, 2017|Papers|

ShodanHat – Search For Hosts Info With Shodan

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Search For Hosts Info With Shodan.

Dependencies
You need to install shodan with pip install shodan or easy_install shodan.
You need to install python-nmap with pip install python-nmap.
You need to set your API Key in the ‘constantes.py’ file.

Options
-h, –help […]

By |April 27th, 2017|Papers|

IR-RESCUE – A WINDOWS BATCH SCRIPT TO COMPREHENSIVELY COLLECT HOST FORENSIC DATA DURING INCIDENT RESPONSE.

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

IR-RESCUE is a Windows Batch script that collects a myriad of forensic data from 32-bit and 64-bit Windows systems while respecting the order of volatility.
It is intended for incident response use at different stages in the […]

By |April 27th, 2017|Papers|

REGA & REGEX : FORENSIC AND REGISTRY ANALYZER

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

REGA is the forensic tool performing collection and analysis of the windows registry hives. (GUI application)
RegEX is a console application for collecting registry hive files.
Supported platforms
Windows (written in C/C++ and MFC)
Platform : Windows
Features
Target OS
Windows NT / […]

By |April 27th, 2017|Papers|

MARA FRAMEWORK V0.2(BETA) – MOBILE APPLICATION REVERSE ENGINEERING & ANALYSIS FRAMEWORK.

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Ken-Pachi / August 12, 2016 / Comments Off on Mara framework v0.2(beta) – Mobile Application Reverse Engineering & Analysis Framework. / Android Tools, Anti Malware/Virus – Malware Analysis, Encryption, Framework, Registry Analysis, Security Tools
Changelog v0.2(beta):
* Adding […]

By |April 26th, 2017|Papers|

VOLATILITY V2.6 – AN ADVANCED MEMORY FORENSICS FRAMEWORK.

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely […]

By |April 26th, 2017|Papers|

creak – Poison, Reset, Spoof, Redirect MITM Script

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Performs some of the most famous MITM attack on target addresses located in a local network. Among these, deny navigation and download capabilities of a target host in the local network performing an ARP poison attack […]

By |April 26th, 2017|Papers|

GIANT_BACKDOOR – WINDOWS BACKDOOR DIAGNOSTIC TOOL.

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Detect and uninstall the sticky keys, utility manager, narrator, on-screen keyboard, magnifier, and display switch backdoors, which allows unauthorized access to a system level command prompt at the login screen. Checks if setch.exe, utilman.exe, narrator.exe, osk.exe, […]

By |April 25th, 2017|Papers|

Brutal Toolkit – Create various Payload, PowerShell Attack, Virus Attack and Launch Listener for a HID

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Brutal is extremely useful for executing scripts on a target machine without the need for human-to-keyboard interaction ( HID -ATTACK ) .When you insert the device, it will be detected as a keyboard, and using the […]

By |April 25th, 2017|Papers|

Forward HTTP/S Traffic To Proxy Instance Via Vproxy

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan
If you are familiar with mobile penetration testing and you did one before, you probably came across this kind of situation when you want to intercept the application HTTP or HTTPS traffic using your favourite proxy […]

By |April 25th, 2017|Papers|