Thursday, 16 August 2018

DT & THE STOODES - Metallic OK 1981

Great and very rare Swedish kbd punk release from 1981 and this was limited to 500 numbered copies. Founded in Stockholm and the band members were Deep Torkel Knutsson (vocals), Gamen (guitar), Johan "Tapeface" Thulin (bass), Micke "The Leaf" Löv (guitar), 2Meter (guitar), Peter Johanesson (drums), Åke Erikson (drums), Jonte Tom Collins (drums), The Vulture (guitar), Michael Ghomri (guitar). This is their only Album which was released by Nerv-Ös Records. Hard to describe but I think this is a live album mixed with rehearsal recordings, partly the sound quality suffers a little bit but in the end a noisy snotty album. Twelve chaotic songs recorded between 1979-1981 at different places (detailed information inside) with a rousing dose of fun and don't let yourselves be deceived by the album title, it's 100% pure punk rock in a decent Low-Fi sound. Cult!


Wednesday, 15 August 2018

Parat - Backdoors creator for Remote Access Control

Parat - A Remote Administration Tool (RAT) written in Python

About Parat: Parat is a simple remote administration tool(RAT) written in python.  Also you can read wiki!

Note: Parat is NOT for real attacks. It simply designed for educational purposes only and so is not responsible for any abusive/offensive uses.

Install and Run Parat:

Features of Parat:
 * Fully UnDetectable(FUD)
 * Compatible with Telegram messanger
 * Bypass Windows User Account Control(UAC)
 * Memory executation
 * No any requirments to setup

Telegram:
   You can communicate parat using telegram messanger. For this do steps:
    * Open telegram.service file by an editor
    * Insert your bot token on line 15, replaced on YOUR_BOT_TOKEN
    * Run telegram.service by typing: python telegram.service
    * Now you can use your bot to control parat :) 
    * A very simple bot for example exist on @ParatKitBot. (Deactived)

   Feel free to share us your comment!

And have something to say about GitHackTools or Parat? Comment below or share this post from GitHackTools FacebookGitHackTools Twitter and GitHackTools Google Plus.


mkvenom - A simple Bash script to create msfvenom Payloads

mkvenom - A Bash script which automates generation of commonly used Metasploit Framework msfvenom payloads
About mkvenom.sh:
 * 🐍 mkvenom.sh is a Bash script which generates a selection of common Metasploit Framework msfvenom payloads for a specific target machine.
 * The idea is to kick this off in the background while performing initial scanning and enumeration of a target during a penetration test activity to speed up your testing workflow (see also: ptboot). It's slow and it's imprecise, but in some circumstances it can be a good time saving tool.

Features:
   This script will create commonly used Metasploit Framework payloads such as reverse meterpreter shells, bind shells etc., including 32-bit/64-bit and staged/inline variants.

   It will produce a directory called payloads which will contain a library of ready to use payload files built using the local and remote TCP/IP parameters specified via the command line:

Requirements:
   The only requirements are the presence of Metasploit Framework 4.16+ and the Bash shell.
   This script is intended for use in a Linux environment and has been tested on Kali Linux 2018.3 and ParrotSec 4.1.

Install and run:
Usage:
   Clone or download the mkvenom.sh file from this repository in to your Linux environment. You might want to consider placing it in ~/bin or /usr/local/bin.

   A directory called payloads will be created in the current working directory when the script runs.

   Command line usage syntax:

   
   For example, if the local penetration tester's system has an IP address of 192.168.10.200 and a remote Linux target system has an IP address of 10.20.20.1:
      mkvenom.sh 10.20.20.1 4444 192.168.10.200 443 linux

   In the above example, payloads which bind to an address on the target would use port 4444 whilst payloads which make reverse connections back to the local machine would use port 443.

License: This software is published here under the MIT licence.

Disclaimer: This software is provided "as is" without any representations or warranties, express or implied.

And have something to say about mkvenom or Evilginx 2? Comment below or share this post from GitHackTools FacebookGitHackTools Twitter and GitHackTools Google Plus.

Cloak - An Intelligent Python Backdoors Framework

Cloak can backdoor any python script with some tricks with msfvenom

What it exactly does?
   Cloak generates a Python payload via msfvenom and then intelligently injects it into the python script you specify.
Cloak logo
   To evade basic detection, Cloak breaks the payload into several parts and places it in different places in the code. If you want the victim to run your injected script as root, Cloak can handle that too. Cloak will be further upgraded in future to support a wide range of payloads, platforms and evasion techniques.

Compatibility:
   Cloak works best on Linux and is compatible with both python2 and python3. Dependencies: Metasploit Framework

Install and Run:

Contribute:
   For now, Cloak can backdoor python scripts but I am looking forward to do the same for C, Bash and Perl scripts. Currently, the default connection method is https and Cloak creates a staged and reverse payload. So, of course the I will try to extend its capabilities which also includes bypassing lowkey AV solutions in Windows.

   If you like the idea, help me achieve the goals. The code is well documented so if you want to contribute you are not going to face any problems. Modify the code, add and improve and start a pull request.
   If you find a bug in the code don't hesitate to start an issue.

Contact: Email: s0md3v@gmail.com Twitter: @s0md3v


And have something to say about GitHackTools or Cloak? Comment below or share this post from GitHackTools FacebookGitHackTools Twitter and GitHackTools Google Plus.

WinPayloads - Undetectable Windows Payloads Generation

WinPayloads written in Python 2.7
As usual, Don't upload payloads to any online virus checkers
   Virus Total Detection - Updated 30/9/2016 - Detected by 8 AV. Read here

For Fully Undetectable Payloads please use the stager functionality Youtube Video:

Install and Run:

Features:
 * UACBypass - PowerShellEmpire. Copyright (c) 2015, Will Schroeder and Justin Warner. All rights reserved.
 * PowerUp - PowerShellEmpire. Copyright (c) 2015, Will Schroeder and Justin Warner. All rights reserved.
 * Invoke-Shellcode. Copyright (c) 2012, Matthew Graeber. All rights reserved.
 * Invoke-Mimikatz. Copyright (c) 2012, Matthew Graeber. All rights reserved.
 * Invoke-EventVwrBypass. Matt Nelson (@enigma0x3)
 * Persistence - Adds payload persistence on reboot
 * Psexec Spray - Spray hashes until successful connection and psexec payload on target
 * Upload to local webserver - Easy deployment
 * Powershell stager - allows invoking payloads in memory & more

Check out the Wiki for installation and more!

Video and Information on Blog (OUTDATED)

And have something to say about GitHackTools or WinPayloads? Comment below or share this post from GitHackTools FacebookGitHackTools Twitter and GitHackTools Google Plus.