Windows


WINDOWS 8.1 PRO x64 Activated (No Crack require)

WINDOWS 8.1 PRO x64 ACTIVATEDTHIS IS ORIGINAL MICROSOFT WINDOWS 8.1 professional with KMS substance integrated into the ISO. NO FILES are TAMPERED WITH NOTHING MISSING, NOTHING added this is often a totally UPDATE ready WINDOWS 8.1THIS IS glorious ISO,…


VMware Server – Vmware for Business

VMware Server is an enterprise class and server management support VirtualCenter for free virtualization products Windows and Linux. It allows businesses from a large number of physical servers to virtual machines, and can take advantage of the benefit…


Chromebackdoor – Backdoor C&C for Populars Browsers

Chromebackdoor is a pentest tool, this tool use a MITB technique for generate a windows executable “.exe” after launch run a malicious extension or script on most popular browsers, and send all DOM datas on command and control.


VIDEO

Require:

  • pip install crxmake
  • wine32

Let’s go

python chromebackdoor.py

web browser infection

  • pour rappel, infiltrer, surveiller, un système informatique sans autorisation est un délit
  • reminder, infiltrate, monitor, computer system without authorization is a crime


MTR – A Network Diagnostic Tool

MTR combines the functionality of the ‘traceroute’ and ‘ping’ programs in a single network diagnostic tool.As mtr starts, it investigates the network connection between the host mtr runs on and a user-specified destination host. After it determ…








NEET – Network Enumeration and Exploitation Tool

Neet is a flexible, multi-threaded tool for network penetration testing. It runs on Linux and co-ordinates the use of numerous other open-source network tools, with the aim of gathering as much network information as possible in clear, easy-to-use form…



Noriben – Portable, Simple, Malware Analysis Sandbox

Noriben is a Python-based script that works in conjunction with Sysinternals Procmon to automatically collect, analyze, and report on runtime indicators of malware. In a nutshell, it allows you to run your malware, hit a keypress, and get a simple text…




backdoorppt – transform your payload.exe into one fake word doc (.ppt)

backdoorppt – ‘Office spoof extensions tool’

Version release: v1.5-Stable
Distros Supported: Linux Kali, Ubuntu, Mint
Author: pedro ubuntu [ r00t-3xp10it ]
Suspicious-Shell-Activity© (SSA) RedTeam develop @2017


Transform your payload.exe into one fake word doc (.ppt)

Simple script that allow users to add a ms-word icon to one
existing executable.exe (using resource-hacker as backend appl)
and a ruby one-liner command that will hidde the .exe extension
and add the word doc .ppt extension to the end of the file name.

Spoof extension methods

backdoorppt tool uses 2 diferent extension spoof methods:
'Right to Left Override' & 'Hide Extensions for Known File Types'
Edit the 'settings' file to chose what method should be used..

cd backdoorppt && nano settings

Dependencies (backend applications required)

xterm, wine, ruby, ResourceHacker(wine)

'backdoorppt script will work on wine 32 or 64 bits'
'it also installs ResourceHacker under .../.wine/Program Files/.. directorys'

Tool Limitations

1º - backdoorppt only supports windows binarys to be transformed (.exe -> .ppt)
2º - backdoorppt requires ResourceHacker installed (wine) to change the icons
3º - backdoorppt present you 6 available diferent icons (.ico) to chose from
4º - backdoorppt does not build real ms-word doc files, but it will transform
your payload.exe to look like one word doc file (social engineering).

Backdoorppt 1º run (Kali distros)

Backdoorppt working (Kali distros)

transformed files on-target system (windows)

Final notes

Target user thinks they are opening a word document file,
but in fact they are executing one binary payload insted.

Credits: Damon Mohammadbagher
Article: goo.gl/hKHesk



Comodo Antivirus – best free Antivirus & Internet Security

At present, there are many different prices available to provide anti-virus programs on the market. However, not all are guaranteed to give the user an effective antivirus program. Thus, the Comodo anti-virus software is designed to use the computer to…