
Awesome-Hacking/README.md at master · Hack-with-Github/Awesome-Hacking Mac Rumors: Apple Mac Rumors and News You Care About Transmit Data Through Sound: Quiet This library uses liquid SDR to transmit data through sound. This makes it suitable for sending data across a 3.5mm headphone jack or via speaker and mic. Quiet can build standalone binaries for encoding/decoding data via .wav files or for streaming through your soundcard via PortAudio. Dependencies Liquid DSP Be sure to work from the devel branchlibfec (optional but strongly recommended)Janssonlibsndfile (optional)PortAudio (optional) Build With the dependencies installed, run . Profiles The encoding and decoding processes are controlled by the profiles in quiet-profiles.json. Cable For cable transmission, use the cable- profiles. Ultrasonic The ultrasonic- profiles encode data through a very low bitrate, but the audio content lies above 16kHz, which should pass through audio equipment relatively well while being inaudible to the average person. Javascript binding for libquiet Javascript binding for libquiet allows sending and receiving data via sound card from any browser. Compatibility Usage
TOR Mail Encrypted Server: OnionMail TOR Mail Encrypted Server for Hidden Services OnionMail is an anonymous, encrypted mail server made to run on TOR network without losing the ability to communicate with the Internet. All OnionMail servers are configured as TOR hidden services and use SSL (via STARTTLS). To use OnionMail all you need is an email client connected to the TOR network – Example: Claws-Mail or Thunderbird. All OnionMail servers are connected in a ‘federated network’. Thanks to the TOR network nobody can know: Who are you.With whom you are communicating.If you are communicating.What are you reading or writing.Where are you.Where is the server.What you are doing. List of some OnionMail’s functions: Multiple instances of server. Password key derivation via multiple keyfiles and passwords.Deleting files with wipe by default.Message headers filtering to hide informations and sigint.POP3 TLS Access.SMTP TLS Access.User’s parameters.Exit node selection to connect to internet.M.A.T.
Pattern Matching Swiss Knife: YARA YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a boolean expression which determine its logic. Let’s see an example: The above rule is telling YARA that any file containing one of the three strings must be reported as silent_banker. Pattern Matching Swiss Knife: Installation Download the source tarball and get prepared for compiling it: tar -zxf yara-3.1.0.tar.gz cd yara-3.1.0 . YARA uses GNU autotools, so it’s compiled and installed in the standard way: . Some YARA’s features depends on the OpenSSL library. The following modules are not copiled into YARA by default: cuckoomagic If you plan to use them must pass the corresponding --enable-<module name> arguments to theconfigure script. For example: . Installing on Windows dummy my_first_rule
Dark Internet Mail Environment: DIME Internet electronic mail (email) was designed in the early days of the Internet, and so lacks any mechanism to protect the privacy of the sender and addressee. Several techniques have been used in an attempt to increase the privacy of email. These techniques have provided either modest increases in privacy, or have proven to be very difficult to use for most people. In addition to protection of content, truly private email must limit information disclosed to handling agents, only exposing information necessary for delivery (the metadata), and provide robust identity guarantees which prevent the impersonation of senders. The goal of DIME is to provide a messaging system capable of protecting user privacy. The term security is frequently has also been frequently abused. These definitions led to specific deficiencies within the current email infrastructure, and its ability to ensure the security of confidential information. Technologies used Directories autoreconf --install Then: .
Automated Modular Cryptanalysis Tool: FeatherDuster Automated Modular Cryptanalysis Tool FeatherDuster is a tool written by Daniel “unicornfurnace” Crowley of NCC Group for breaking crypto which tries to make the process of identifying and exploiting weak cryptosystems as easy as possible. Cryptanalib is the moving parts behind FeatherDuster, and can be used independently of FeatherDuster. Cryptanalib can be used separately of FeatherDuster to make Python-based crypto attack tools. Documentation for cryptanalib functions can be accessed through the Python help() function The analysis engine in Cryptanalib, used by FeatherDuster, can automatically detect encodings and decode samples. The engine assumes that all samples are generated with the same process (for instance, base64encode(aes_encrypt(datum))), but can handle mixed samples to some degree. Vanilla Base64 ASCII hex-encoding Zlib compression Cryptanalib’s analysis engine can detect a number of properties in the analysis phase, too: This is a beta release of FeatherDuster. Installation
Multiprotocol Network Emulator - Simulator: IMUNES IMUNES GUI is a simple Tcl/Tk based management console, allowing for specification and management of virtual network topologies. The emulation execution engine itself operates within the operating system kernel. Univesity of Zagreb developed a realistic network topology emulation / simulation framework based on the FreeBSD and Linux operating system kernel partitioned into multiple lightweight virtual nodes, which can be interconnected via kernel-level links to form arbitrarily complex network topologies. Main advantages: Current applications: General-purpose network testbed used for Ericsson Nikola Tesla product testingRealistic laboratory and learning environments used for teaching at the University of Zagreb Technologies used: jails, netgraph (FreeBSD)Docker, Open vSwitch (Linux) IMUNES advantages Project overview As invaluable tools in networked and distributed systems research, network emulators and simulators offer a viable alternative to live experimental networks. FreeBSD packages
Open-Source Phishing Toolkit: gophish Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute hishing engagements and security awareness training. Installing Gophish Using Pre-Built Binaries Gophish is provided as a pre-built binary for most operating systems. With this being the case, installation is as simple as downloading the ZIP file containing the binary that is built for your OS and extracting the contents. Installing Gophish from Source One of the major benefits of having written gophish in the Go programming language is that it is extremely simple to build from source. To install gophish, simply run go get github.com/gophish/gophish This downloads gophish into your $GOPATH. Next, navigate to $GOPATH/src/github.com/gophish/gophish and run the command go build This builds a gophish binary in the current directory. Running Gophish Now that you have gophish installed, you’re ready to run the software.
Malicious Traffic Detection System: Maltrail Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user defined lists, where trail can be anything from domain name (e.g. zvpprsensinaix.com for Banjori malware), URL (e.g. for known malicious executable) or IP address (e.g. 103.224.167.117 for known attacker). Also, it has (optional) advanced heuristic mechanisms that can help in discovery of unknown threats (e.g. new malware). The following (black)lists (i.e. feeds) are being utilized: As of static entries, the trails for the following malicious entities (e.g. malware C&Cs) have been manually included (from various AV reports): Architecture Maltrail is based on the Sensor <-> Server <-> Client architecture. Server‘s primary role is to store the event details and provide back-end support for the reporting web application. Source && Download
Open-Source Disk Encryption for Windows: LibreCrypt LibreCrypt is an Open-Source “on-the-fly” transparent disk encryption for Windows (both 32 and 64 bit). LUKS compatible – (formerly DoxBox). This software can create “virtual disks” on your computer – anything written to these disks is automatically encrypted before being stored on your computer’s hard drive. Features Easy to use, with a ‘wizard’ for creating new ‘containers’.Full transparent encryption, containers appear as removable disks in Windows Explorer.Explorer mode lets you access containers when you don’t have admin permissions.Compatible with Linux encryption, Cryptoloop “losetup”, dm-crypt, and LUKS. Please note this is a Beta version with some known limitations. New features in version 6.2 Change of name to ‘LibreCrypt’Many UI bugs fixedImproved support for GPT partitioned discs. Release notes Important: LibreCrypt in Portable mode will not work on Windows Vista and later 64 bit versions without a extra step before use. Passwords About LibreCrypt Technical details SafeBoot
Best Free Server Monitoring Tools Monitoring Linux System and Network Performance can be a daunting task for a new system admin. Network and system monitoring is a broad category. There are solutions that monitor for the proper operation of servers, network gear, and applications, and there are solutions that track the performance of those systems and devices, providing trending and analysis. These tools can make your life easier. Note: All tools are available under all flavors of Linux . Top – Linux Process Monitoring Linux Top command is a performance monitoring program used frequently by many system administrators to monitor Linux performance. # top VmStat – Virtual Memory Statistics Linux VmStat command is used to display statistics of virtual memory, kernerl threads, disks, system processes, I/O blocks, interrupts, CPU activity and much more. Lsof – List Open Files Lsof command is used to display a list of all open files and processes. Tcpdump – Network Packet Analyzer Netstat – Network Statistics # htop # iotop atop ftptop
Network Forensic Analysis Tool: Xplico CyberPunk » Digital Forensic The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isn’t a network protocol analyzer. Xplico is released under the GNU General Public License and with some scripts under Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) License Features Xplico is a Network Forensic Analysis Tool (NFAT) Xplico System is composed from four macro-components: a Decoder Manager called Demaan IP/network decoder called Xplicoa set of applications called Manipulators for the manipulation of decoded dataa visualization system to view data extracted Install Source && Download Visitors Rating 11 ratings You have rated this Read More Command Line Interface DLL Injector: Injectory Multiplatform Linux Sandbox: Detux Memory Scanning Tool: MemScan
Open Source Network Access Control: Packet Fence PacketFence is a fully supported, trusted, Free and Open Source network access control (NAC) system. Boasting an impressive feature set including a captive-portal for registration and remediation, centralized wired and wireless management, 802.1X support, layer-2 isolation of problematic devices, integration with IDSs and vulnerability scanners; PacketFence can be used to effectively secure networks – from small to very large heterogeneous networks. Free and Open Source Network Access Control Boasting an impressive feature set including a captive-portal for registration and remediation, centralized wired and wireless management, powerful BYOD management options, 802.1X support, layer-2 isolation of problematic devices; PacketFence can be used to effectively secure networks small to very large heterogeneous networks. Among the different markets are : Features: PacketFence reuses many components in an infrastructure. Depending on your setup you may have to install additional components like: