Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Topics - Omega

Pages: [1] 2 3 ... 10
Leaked Tools / Cobalt Strike 4.1 licensed!
« on: May 12, 2022, 06:21:00 AM »

Cobalt Strike is a commercial, full-featured, remote access tool that bills itself as "adversary simulation software designed to execute targeted attacks and emulate the post-exploitation actions of advanced threat actors". Cobalt Strike’s interactive post-exploit capabilities cover the full range of ATT&CK tactics.


Cobalt Strike’s system profiler discovers which client-side applications your target uses, with version information.

Post Exploitation

Beacon is Cobalt Strike’s payload to model an advanced actor. Beacon executes PowerShell scripts, logs keystrokes, takes screenshots, downloads files, and spawns other payloads.

Covert Communication

Beacon’s network indicators are malleable. Load a C2 profile to look like another actor. Use HTTP, HTTPS, and DNS to egress a network. Use named pipes to control Beacons, peer-to-peer, over the SMB protocol.

Attack Packages

Use Cobalt Strike to host a web drive-by attack or transform an innocent file into a trojan horse.

    Java Applet Attacks
    Microsoft Office Documents
    Microsoft Windows Programs
    Website Clone Tool

Spear phishing

Import a message and let Cobalt Strike replace links and text to build a convincing phish for you. Cobalt Strike sends email and tracks who clicks.

Browser Pivoting

Use a Browser Pivot to go around two-factor authentication and access sites as your target.


Connect to a Cobalt Strike team server to share data, communicate in real-time, and control systems compromised during the engagement.

Reporting and Logging

Cobalt Strike’s reports provide a timeline and a list of indicators from red team activity. These reports are made to benefit our peers in security operations. Cobalt Strike exports reports as both PDF and MS Word documents.

File Pass: BHS123

Version 4.1/4.0 + Arsenal_3.13 kit

Version 3.19

General Discussion / Is covid gone?
« on: May 12, 2022, 05:21:53 AM »
I don't see much about covid anymore, is this happening worldwide? Is the war in Ukraine the new trend? :-\  ???  ???  ::)

Scripts / LazyAircrack
« on: May 10, 2022, 06:25:11 PM »
The main purpose of the tool is automating wifi attack. It is a automated bash script for aircrack-ng. Crack the four way handshake and get into the network.

LINK: Lazyaircrack

Scripts / Offensive Wifi Toolkit
« on: May 10, 2022, 06:21:45 PM »

 This tool compiles some necessary tools for wifi auditing in a unix bash script with a user friendly interface. The goal of owt is to have the smallest file size possible while still functioning at maximum proficiency.


Scripts / -= W0ut =-
« on: May 10, 2022, 06:12:17 PM »

LINK: W0ut

Tools / Wicker the wifi hacker
« on: May 10, 2022, 06:07:55 PM »
this is an automated GUI based wifi hacking tool or just a shell script:D

whatever it might can save your expensive time to become wasted

automate your wifi hacking with wicker-gui.


you must need an wifi adapter which supports packet injection and monitor mode

LINK: Wicker-gui

Scripts / Airgeddon
« on: May 10, 2022, 05:54:07 PM »
Interface mode switcher (Monitor-Managed) keeping selection even on interface name changing
DoS over wireless networks using different methods (mdk3, mdk4, aireplay-ng). "DoS Pursuit mode" available to avoid AP channel hopping (available also on DoS performed on Evil Twin attacks)
Full support for 2.4Ghz and 5Ghz bands
Assisted WPA/WPA2 personal networks Handshake file and PMKID capturing
Cleaning and optimizing Handshake captured files
Offline password decrypting on WPA/WPA2 captured files for personal networks (Handshakes and PMKIDs) using dictionary, bruteforce and rule based attacks with aircrack, crunch and hashcat tools. Enterprise networks captured password decrypting based on john the ripper, crunch, asleap and hashcat tools. GPU support available for hashcat.
Evil Twin attacks (Rogue AP)
Only Rogue/Fake AP mode to sniff using external sniffer (Hostapd + DHCP + DoS)
Simple integrated sniffing (Hostapd + DHCP + DoS + Ettercap)
Integrated sniffing, sslstrip2 (Hostapd + DHCP + DoS + Bettercap)
Integrated sniffing, sslstrip2 and BeEF Browser Exploitation Framework (Hostapd + DHCP + DoS + Bettercap + BeEF)
Captive portal with "DNS blackhole" to capture wifi passwords (Hostapd + DHCP + DoS + Dnsspoff + Lighttpd)
Optional MAC spoofing for all Evil Twin attacks
WPS features
WPS scanning (wash). Self parameterization to avoid "bad fcs" problem
Custom PIN association (bully and reaver)
Pixie Dust attacks (bully and reaver)
Bruteforce PIN attacks (bully and reaver)
Null PIN attack (reaver)
Known WPS PINs attack (bully and reaver), based on online PIN database with auto-update
Integration of the most common PIN generation algorithms (ComputePIN, EasyBox, Arcadyan, etc.)
Offline PIN generation and the possibility to search PIN results on database for a target
Parameterizable timeouts for all attacks
Enterprise networks attacks
Fake AP using "smooth" and "noisy" modes capturing enterprise hashes and plain passwords
Custom certificates creation
WEP All-in-One attack (combining different techniques: Chop-Chop, Caffe Latte, ARP Replay, Hirte, Fragmentation, Fake association, etc.)
Adaptation of WPA2 attacks to work with WPA2/WPA3 networks working in "Mixed Mode"
Compatibility with many Linux distributions (see Requirements section)
Easy targeting and selection in every section
Drag and drop files on console window for entering file paths or autocomplete using tab key on every path input for easier use
Dynamic screen resolution detection and windows auto-sizing for optimal viewing
Controlled Exit. Cleaning tasks and temp files. Restoring nftables/iptables after an attack that require changes on them. Option to keep monitor mode if desired on exit
Multilanguage support and autodetect OS language feature (see Supported Languages section)
Help hints in every zone/menu for easy use
Auto-update. Script checks for newer version if possible
Docker image for easy and quick container deployment. Use already built image on Docker Hub or build your own
Http proxy auto detection for updates
Wayland graphic system supported (not only X window system)
Tmux support for headless (systems without X window) environments
Multiple configurable options based on fallback substitution variables options system which allow to configure many enhancements like enable/disable colors, 5Ghz band, auto updates, hint printing, etc.
Full compatibility with iptables and nftables with autodetection and possibility to force iptables by setting an option
Available plugins system to let the community create their own content in an easy and flexible way using the created function hooking system. More info at Plugins System section

LINK: Airgeddon

Tools / Eviltwin-Huawei
« on: May 10, 2022, 05:37:28 PM »

    Written in python RUN ANYWHERE!
    very low hardware/network usage
    Optimized for slow hotspots
    Low size assets 1.4mb!
    lightning fast validation with aircrack-ng
    Available in two languages EN/AR
    Extracted from real device
    Looks quite convincing


LINK : Eviltwin-Huawei

Operating Systems Discussions / Upcoming Cerberus Linux v4!
« on: May 10, 2022, 03:58:31 PM »
Is anyone missing Cerberus Linux? Should we build a new Update for Cerberus? ::)  ::)

Leaked Tools / Hiddenz HVNC
« on: May 06, 2022, 08:21:31 AM »


Scan Result:


I am not a fan of Cracked tools, my way was always to buy tools/rats or any tool from the original dev and receive updates with new features. So if you ask me I am not a fan of any cracked software! Buy always a tool from the developer, to get all new features and stay updated! The cracked tools will get outdated and payloads will stop working after a while!

Scripts / Wifite
« on: May 06, 2022, 08:00:39 AM »

Wifite is for Linux only.

This repo is a complete re-write of wifite, a Python script for auditing wireless networks.

Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches!

Wifite is designed to use all known methods for retrieving the password of a wireless access point (router). These methods include:

    WPS: The Offline Pixie-Dust attack
    WPS: The Online Brute-Force PIN attack
    WPA: The WPA Handshake Capture + offline crack.
    WPA: The PMKID Hash Capture + offline crack.
    WEP: Various known attacks against WEP, including fragmentation, chop-chop, aireplay, etc.

Run wifite, select your targets, and Wifite will automatically start trying to capture or crack the password.


Code: [Select]
git clone
cd wifite2
sudo ./

Scripts / NIVOS
« on: May 06, 2022, 07:53:23 AM »

NIVOS is a hacking tool that allows you to scan deeply , crack wifi, see people on your network. It applies to all linux operating systems. And it is improving every day, new packages are added. Thank You For Using NIVOS :> [NIVOS Created By NIVO Team]

Installation & Setup
Code: [Select]
pip install os
git clone
sudo python3

Code: [Select]
sudo python3

[1]     Scan Devices On Your Network                                                     (By Error)
[2]     Scan Networks                                                                    (By Error)
[3]     Crack Network With Mac Adress                                                    (By Error)
[4]     Scan Website Vulnerabilities And Deeply Information Of Website                   (By Error)
[5]     DOS-DDOS Tool                                                                    (By Error)
[6]     Phone Info Tool                                                                  (By Error)
[7]     System INFO                                                                      (By Error)
[8]     Sniffing , Spoofing                                                              (By Error)
[9]     IP Information Gathering                                                         (By Error)
[10]    Email Verifier                                                                   (By Error)
[11]    Port Scanner                                                                     (By Error)
[12]    SQL Injection Scanner                                                            (By Error)
[13]    Discord Spammer                                                                  (By Error)
[14]    Wordlist Generator                                                               (By Error)
[15]    Find Social Media Account With Username                                          (By Error)
[16]    See index.html Source Of Website                                                 (By Error)
[17]    Creating Fake Wifi Acces Point For Phishing                                      (By Error)
[18]    XSS Vulnerebility Scan                                                           (By Error)
[19]    Dedect ARP Spoof                                                                 (By Error)
[20]    Image Meta Data                                                                  (By Error)
[21]    Brute Force ZIP                                                                  (By Error)
[22]    Instagram Bot                                                                    (By Januie)
[23]    Email Extractor                                                                  (By Error)
[24]    Password Generator                                                               (By Januie)
[C]     Credits
[Q]     Quit

Scripts / Wi-Fi Exploitation Framework
« on: May 06, 2022, 07:39:05 AM »

A fully offensive framework to the 802.11 networks and protocol with different types of attacks for WPA,WEP,WPS, automated hash cracking and much more.

I recommend you my alfa adapter: Alfa AWUS036ACM, which works really great with both, 2.4 and 5 Ghz
Tested and supported in Kali Linux, Parrot OS, Arch Linux and Ubuntu

*However it's not finished and may have issues, try it at your own risk.*

Deauthentication Attack
Authentication Attack
Beacon Flood Attack
PKMID Attack
Pixie Dust Attack
Chopchop Attack
Replay Attack
Michael Exploitation Attack
Caffe-Latte Attack
Passive/Stealthy Attack
☑️ Log generator

☑️ Useful attacks

☑️ Handshake Cracking

☑️ Check monitor mode

🔲 5G Attacks

☑️ Custom wordlist selector

☑️ Auto detect requirements

☑️ Rainbow Tables creator

🔲 Router Slower Attack

🔲 Bluetooth Attacks

You need a few tools, but don't worry because the framework detect your OS and install the dependencies if you don't have them:

Code: [Select]

Code: [Select]
git clone
cd WEF
chmod +x

Tools / CLRvoyance
« on: May 06, 2022, 07:34:31 AM »
CLRvoyance is a shellcode kit that supports bootstrapping managed assemblies into unmanaged (or managed) processes. It provides three different implementations of position independent shellcode for CLR hosting, as well as a generator script for quickly embedding a managed assembly in position independent shellcode.

Please see the release blogpost here for technical information.

Code: [Select]
$ py -h
usage: [-h] -a [executable] [-p [32|64]] [-d [net|c]] [-n] [--apc]

optional arguments:
  -h, --help       show this help message and exit
  -a [executable]  Assembly
  -p [32|64]       Platform
  -d [net|c]       Dump binary shellcode of assembly
  -n               Load assembly into a new domain
  --apc            Use safe APC shellcode


Pages: [1] 2 3 ... 10