Extreme Hacking

We work in Dark, to serve the Light

Extreme Hacking /

F-Scrack – Bruteforce Tool With Mutli-Protocol Support

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

F-Scrack is a single file bruteforcer supports multi-protocol, no extra library requires except python standard library, which is ideal for a quick test.
Supported protocol:

FTP
MySQL
MSSQ
MongoDB
Redis
Telnet
Elasticsearch
PostgreSQL.

Compatible Operating system:

OSX
Linux
Windows
Python 2.6+

How to run the command:
python F-Scrack.py -h […]

By |November 27th, 2016|Papers|

slowloris – DoS tool using low bandwidth

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Slowloris is an HTTP Denial of Service attack tool that affects threaded servers. It is developed using python language. The bot starts to make lots of HTTP requests and then sends headers periodically ( every 15 seconds ) to keep the connections open. It never […]

By |November 27th, 2016|Papers|

WinMACSpoofer – Spoofing tool for Windows

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

WinMACSpoofer is a open source tool which helps to spoof the MAC address and host name.

How to use:
Run the tool in “administrator mode” for the functions to work properly.

Step 1: Set a new Random MAC address.

Press the randomize button to generate a random MAC […]

By |November 27th, 2016|Papers|

WAFNinja – A Tool To Bypass WAF

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

WAFNinja is a CLI tool written in Python. It is the best tool for penetration testers to bypass a WAF by automating steps necessary for bypassing input validation. The tool was created with the objective to be easily extendable, simple to use and usable in […]

By |November 27th, 2016|Papers|

Radium Keylogger – A Keylogger Using Python

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Python keylogger with multiple features.
Requirements:

Install PyHook
Install PyWin32
Install Microsoft Visual C++ Compiler for Python
Install PyInstaller

Install and Use:
Step 1: Download the libraries if you are missing any.
Step 2: Set the Gmail username and password and remember to check allow connection from less secure […]

By |November 27th, 2016|Papers|

OpenDoor – OWASP Directory Access Scanner

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

OpenDoor is an open-source software that scans the site directories and find all possible ways to login, empty directories and entry points. Scans conducted in the dictionary that is included in this application.
System Requirements:

Python 2.7.x

Installation command:
sudo pip install -r requirements.txt
Features:

multithreading
filesystem log
detect redirects
[…]

By |November 27th, 2016|Papers|

OpenStego: A Steganography Application Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

OpenStego is an open-source software which circulated under the terms of the GNU(General Public License v2.0.)
As well as it is a Steganography application that offers two main functionalities:

Data Hiding: It can hide any data within a cover file such as – images.
Watermarking: Watermarking […]

By |November 17th, 2016|Papers|

WPSCrackGUI: GUI Cracking For WPS Networks Reaver

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

WPSCrackGUI is a graphical interface for wireless networks cracking WPS. And it is based on Reaver as well as it is one of the simplest GUI packages to attack Linux.
And it is also the nicest looking. By this package you can active monitor mode on […]

By |November 17th, 2016|Papers|

T50: Very Fast Network Packet Injector Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

It is the fastest network packet injector. T50 Sukhoi PAK FA is a mixed as well as fastest network packet injector.
Or you can say that it is a kind of a packet injection free which is generated by Brazilian Nelson Brito who is capable of […]

By |November 17th, 2016|Papers|

Matriux: A Fully Featured Security Distribution Cyber Forensic Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Matriux is a GNU/Linux, Debian-based security distribution that is designed for diffusion testing as well as for the investigations of cyber forensic.

But it is a mainly designed for security enthusiasts as well as professionals that can also be used usually as your default OS and […]

By |November 17th, 2016|Papers|