263 skills found · Page 9 of 9
mine3krish / ZenoZeno is a lightweight, plugin-first Markdown blog framework built with JavaScript. It's designed to be simple, hackable, and extendable.
MadhavSingh2236 / Classify Websites Into Amiable Or Malicious Using Raw DataWith WWW being the global platform, various fields inclusive to the same have emerged until hitherto. Due to ever-changing forms of cyber Security, it has become a necessity to classify Malicious websites so as to secure personal content. In this project we have implemented The State-Of-the-Art Decision Tree Machine Learning Models such as Random Forest and Decision Tree to classify URLs as malicious or amiable. Implementation of Classification algorithms for discrete data as well as normal regression model is used in the project. Malevolent URLs have been broadly used to mount different digital assaults including spamming, phishing and malware. Recognition of malignant URLs and distinguishing proof of danger types are basic to upset these assaults. Knowing the sort of a danger empowers assessment of seriousness of the assault and embraces a viable countermeasure. Existing strategies commonly distinguish vindictive URLs of a solitary assault type. In this paper, we propose technique utilizing AI to identify malevolent URLs of all the mainstream assault types. While the World Wide Web has become a stellar application on the Internet, it has likewise gotten a massive danger of digital assaults. Enemies have utilized the Web as a vehicle to convey malignant assaults, for example, phishing, spamming, and malware contamination. For instance, phishing ordinarily includes sending an email apparently from a dependable source to deceive individuals to click a URL (Uniform Resource Locator) contained in the email that joins to a fake page. To address Web-based assaults, an incredible exertion has been coordinated towards identification of noxious URLs. A typical countermeasure is to utilize a boycott of vindictive URLs, which can be built from different sources, particularly human criticisms that are exceptionally precise yet tedious. Boycotting acquires no bogus positives, however is successful just for known noxious URLs. It can't identify obscure malevolent URLs. The very idea of careful match in boycotting these renders it simple to be sidestepped. This shortcoming of blacklisting has been tended to by oddity-based location techniques intended to identify obscure vindictive URLs. In these strategies, a characterization model dependent on discriminative principles or highlights is worked with either information from the earlier or through machine learning. Choice of discriminative standards or highlights assumes a basic function for the presentation of a locator. Online malware assaults become one in everything about chief genuine dangers that need to be tended too frantically. Numerous methodologies that have stood out as promising manners by which of safeguard work, for example, malware grasp utilizing various boycotts. Nonetheless, these standard methodologies ordinarily neglect to watch new assaults due to the adaptability of malignant sites. Consequently, it's hard to deal with state-of-the-art boycotts with data concerning new vindictive sites. Malignant location identification assumes a significant part for a few network protection applications, and unmistakably AI moves toward square measure a promising course. In mix with protection imperatives on information sets of real client traffic, its irksome for scientists and product engineers to measure hostile to malware arrangements against huge scope information sets of practical net traffic. AI strategy [1] region unit utilized so as to characterize the online deals into malignant and benevolent URLs. The appearance of ongoing correspondence innovations has had enormous contact with in the development and advancement of organizations spamming over a few applications just as web based banking, online business, and long range informal communication. In actuality, in the present age it's almost required to have a web presence to run a famous endeavour. Accordingly, the significance of the overall net has ceaselessly been expanding. Unfortunately the mechanical promotions return in expansion to new unobtrusive strategies to assault and trick client. Such assaults grasp noxious sites that sell fake stock, financial extortion by fooling clients into uncovering delicate data that in the long run cause stealing of money or character, or maybe placing in malware inside the clients framework. There square measure a huge kind of procedures to actualize such assaults, similar to explicit hacking attempts, Derive-by abuses, Denial of administration [2], Distributed refusal of administration [1] and bunches of others. Concentrating the changeability of assaults, without a doubt new assault assortments, and furthermore the unnumbered settings inside which such assaults will appears, it's exhausting to style-solid frameworks to find digital security penetrates. The restrictions of customary security the board advancements are getting to an ever increasing extent genuine given this remarkable development of new security dangers, fast changes of new IT advancements, and critical deficiency of security experts. The vast majority of these assaulting strategies are acknowledged through spreading traded off URLs. A primary exploration exertion in pernicious URL recognition has zeroed in on choosing profoundly successful discriminative highlights. Existing techniques were intended to distinguish pernicious URLs of a solitary assault type, for example, spamming, phishing, or malware. In this paper, we propose a strategy utilizing Machine Learning Algorithms on how to distinguish malevolent URLs of all the well known assault types including phishing, spamming and malware contamination, and distinguish the assault types noxious URLs endeavour to dispatch.
nbqofficial / PrometheusAll-in-one hacking framework
joelibaceta / Hack ErHow to build a web micro framework using hack, we have called it Hack-er, this initiative was born to bring more developers to be closer to hack, simplifying the first steps thought a tutorial.
unkn0wnh4ckr / Tufhubi will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack, etc tools in it that you use directly in the script the twitter bruteforce does not work sadly
whiterabb17 / ShamanicResilient, Stealthy & Capable Windows Backdoor. Utilizing Telegram for command relays
TusharPuranik / Hacking Android Devices Using Metasploit FrameworkAndroid hacking made easy with Metasploit framework - my project on exploiting vulnerabilities for penetration testing and ethical hacking.
hamedmahdavi72 / Easy ScaffoldA minimal and hackable codebase for implementing agentic scaffolds with LLMs. This framework is designed for evaluation, data generation, and future reinforcement learning research. Write your agent logic in Python, configure LLM calls in YAML, and modify anything that doesn't fit your needs.
Dzxmzstrt / Bucin.sh#! cd /data/data/com.termux/files/usr/bin/bash clear cd data clear echo "Ngapain Ke Sini? siap Siap Ngebucin Ya!" | lolcat echo "Jawab:" ;read {$} clear figlet Mr.BalBaL.X | lolcat echo "================| Tools Bucin Gan:v | ===============" | lolcat echo"" echo"" figlet InstallerV5 echo " _______________________ " | lolcat echo "_________| Tools Installer V.5 |___________" | lolcat echo "|________|_____________________|__________|" | lolcat echo "|__| Thanks To 28 Black Hat Cyber Team |__|" | lolcat echo "|__|===================================|__|" | lolcat echo "|__| •Bucin Area😂• |__|" | lolcat echo "|__|===================================|__|" | lolcat echo "|_________| Author: Mr.B41B4L.X |_________|" | lolcat echo " |_____________________| " | lolcat echo "" echo "" echo "===========================================" | lolcat echo " Daftar Tools Yang Tersedia Synk " | lolcat echo "===========================================" | lolcat ################################################### # CTRL + C ################################################### trap ctrl_c INT ctrl_c() { clear echo $" kok keluar?,Kmu Mau Kmn Cintaku..Kok Buru Buru Banget Sih😢" | lolcat echo "" echo $" Byee,see you Yank❤..." | lolcat sleep 1 exit } lagi=1 while [ $lagi -lt 6 ]; do echo "" echo "" echo $"1. Nmap"; echo "=============================" | lolcat echo $"2. Admin-finder"; echo "=============================" | lolcat echo $"3. RED_HAWK"; echo "=============================" | lolcat echo $"4 Lazymux"; echo "=============================" | lolcat echo $"5. Tools-X"; echo "=============================" | lolcat echo $"6. LITESPAM Buat Spam Hati Dia"; echo "=============================" | lolcat echo $"7. LITEDDOS Buat Melumpuhkan Hati Dia"; echo "=============================" | lolcat echo $"8. HACK Facebook"; echo "=============================" | lolcat echo $"9. ToolsBAJINGANv6"; echo "=============================" | lolcat echo $"10. ToolsTU4N B4DUT"; echo "============================" | lolcat echo $"11. spamSms"; echo "============================" | lolcat echo $"12. Tools Striker"; echo "============================" | lolcat echo $"13. generate KTP/KK Untuk Menikahi Dia"; echo "=============================" | lolcat echo $"14. Tools Mr.Cakil"; echo "=============================" | lolcat echo $"15. Tools santetOnline"; echo "=============================" | lolcat echo $"16. Script Deface Creator"; echo "=============================" | lolcat echo $"17. Install Tools Crew-Bot"; echo "=============================" | lolcat echo $"18. Install Katoolin"; echo "=============================" | lolcat echo $"19. Tools Mr.Rv1.1"; echo "=============================" | lolcat echo $"20. Bermain Game Di Termux"; echo "=============================" | lolcat echo $"21. Nuyul Kubik"; echo "=============================" | lolcat echo $"22. Perkiraan Cuaca Kota Bekasi"; echo "=============================" | lolcat echo $"23. Animasi Keteta"; echo "=============================" | lolcat echo $"24. Menampilkan Informasi android"; echo "=============================" | lolcat echo $"25. Web Phising Creator"; echo "=============================" | lolcat echo $"26. Tools Hek Bank :v"; echo "=============================" | lolcat echo $"27. Spam SMS Jdid"; echo "=============================" | lolcat echo $"28. Kubik Bot"; echo "=============================" | lolcat echo $"29. Kumpulan Web VULN"; echo "=============================" | lolcat echo $"30. Bot Komentar FB"; echo "=============================" | lolcat echo $"31. Kumpulan Status Bucin:v"; echo "=============================" | lolcat echo $"32. Weeman"; echo "=============================" | lolcat echo $"33. metasploit"; echo "=============================" | lolcat echo $"34. OSIF BOT"; echo "=============================" | lolcat echo $"35. Scanner-INURLBR"; echo "=============================" | lolcat echo $"00. Exit"; echo "" echo -e "╭─Pilih Dong Sayank>" |lolcat read -p "╰─#" pil; # Nmap case $pil in 1) pkg install nmap echo -e "${y} {1} Masukkan Web${endc}:" read web nmap $web echo$ ;; # admin-finder 2) git clone https://github.com/the-c0d3r/admin-finder.git echo -e "${y} cara menggunakan admin finder" echo -e "${y} cd admin-finder" echo -e "${y} python admin-finder.py" cd /data/data/com.termux/files/home/admin-finder/ python2 /data/data/com.termux/files/home/admin-finder/admin-finder.py echo ;; #RED_HAWK 3) git clone https://github.com/Tuhinshubhra/RED_HAWK echo -e "${y} Installer RED_HAWK..." echo -e "${y} cd RED_HAWK" echo -e "${y} php RED_HAWK.php" cd /data/data/com.termux/files/home/RED_HAWK/ php /data/data/com.termux/files/home/RED_HAWK/ RED_HAWK.php ;; #Lazymux 4) git clone https://github.com/Gameye98/Lazymux echo -e "${y} Installer Lazymux..." echo -e "${y} cd Lazymux" echo -e "${y} python lazymux.py" cd /data/data/com.termux/files/home/Lazymux/ python2 /data/data/com.termux/files/home/Lazymux/ lazymux.py ;; #Tools-X 5) git clone https://github.com/Rajkumrdusad/Tool-X echo -e "${y} Installer Tool-X..." echo -e "${y} cd Tool-X" echo -e "${y} sh install.aex" cd /data/data/com.termux/files/home/Tool-X bash /data/data/com.termux/files/home/Tool-X/sh install.aex ;; #LITESPAM 6) git clone https://github.com/4L13199/LITESPAM cd LITESPAM sh LITESPAM.sh cd /data/data/com.termux/files/home/LITESPAM bash /data/data/com.termux/files/home/LITESPAM/LITESPAM.sh ;; #LITEDDOS 7) git clone https://github.com/4L13199/LITEDDOS cd LITEDDOS python2 LITEDDOS.py cd /data/data/com.termux/files/home/LITEDDOS python2 /data/data/com.termux/files/home/LITEDDOS/ LITEDDOS.py ;; #HACKFB 8)git clone https://github.com/hnov7/mbf cd mbf pip2 install mechanize python2 mbf.py cd /data/data/com.termux/files/home/mbf python2 /data/data/com.termux/files/home/mbf/mbf.py ;; #ToolsBAJINGANv6 9) git clone https://github.com/DarknessCyberTeam/BAJINGANv6 cd BAJINGANv6 sh BAJINGAN.sh cd /data/data/com.termux/files/home/BAJINGANv6 bash /data/data/com.termux/files/home/BAJINGANv6/BAJINGAN.sh ;; #Tools TU4N B4DUT 10) git clone https://github.com/TUANB4DUT/TOOLSINSTALLERv3 cd TOOLSINSTALLERv3 chmod +x TUANB4DUT.sh sh TUANB4DUT.sh cd /data/data/com.termux/files/home/TUANB4DUT bash /data/data/com.termux/files/home/TUANB4DUT/TUANB4DUT.sh ;; #SpamSMS 11) git clone https://github.com/joss24242/SpamSms cd SpamSms python2 mantan.py cd /data/data/com.termux/files/home/SpamSms python2 /data/data/com.termux/files/home/SpamSms/mantan.py ;; #Tools Striker 12) git clone https://github.com/UltimateHackers/Striker cd Striker pip2 install -r requirements.txt python2 striker.py cd /data/data/com.termux/files/home/Striker python2 /data/data/com.termux/files/home/Striker/striker.py ;; #GENERATE KTP/KK 13) git clone https://github.com/zerosvn/ktpkkgenerate cd ktpkkgenerate php zerosvn.php cd /data/data/com.termux/files/home/ktpkkgenerate php /data/data/com.termux/files/home/ktpkkgenerate/zerosvn.php ;; #Tools Mr.Cakil 14) git clone https://github.com/mrcakil/Mrcakil.git cd Mrcakil chmod +x tools ./tools cd /data/data/com.termux/files/home/Mrcakil bash /data/data/com.termux/files/home/Mrcakil/tools.sh ;; #Tools Santet Online 15) git clone https://github.com/Gameye98/santet-online cd santet-online python2 santet.py cd /data/data/com.termux/files/home/santet-online python2 /data/data/com.termux/files/home/santet-online/santet.py ;; #ScDefaceCreator 16) git clone https://github.com/Ubaii/script-deface-creator cd script-deface-creator chmod +x create.py python2 create.py cd /data/data/com.termux/files/home/script-deface-creator python2 /data/data/com.termux/files/home/script-deface-creator/create.py ;; #ToolsCrewBot 17) git clone https://github.com/Xeit666h05t/CrewBot cd CrewBot python2 CrewBot.pyc cd /data/data/com.termux/files/home/Crew-Bot python2 /data/data/com.termux/files/home/Crew-Bot/ Crew-Bot.pyc ;; #Katoolin 18) pkg install gnupg git clone https://github.com/LionSec/katoolin.git cd katoolin python2 katoolin.py nano katoolin.py cd /data/data/com.termux/files/home/Crew-Bot python2 /data/data/com.termux/files/home/script-deface-creator/ Crew-Bot.pyc ;; #tool Mr.Rv1.1 19) pkg install gem pkg install figlet gem install lolcat git clone https://github.com/Mr-R225/Mr.Rv1.1 cd Mr.Rv1.1, sh Mr.Rv1.1.sh cd /data/data/com.termux/files/home/Mr.Rv1.1 bash /data/data/com.termux/files/home/Mr.Rv1.1/ Mr.Rv1.1.sh ;; #BermainGame 20) pkg install moon-buggy moon-buggy ;; #Nuyul Kubik 21) pkg install php pkg install nano git clone https://github.com/adidoank/kubik cd kubik nano cfg.php cd /data/data/com.termux/files/home/kubik php /data/data/com.termux/files/home/kubik/ cfg.php ;; #Perkiraan Cuaca Kota Bekasi Dan Sekitarnya 22) pkg install curl curl http://wttr.in/bekasi exit ;; #Menampilkan Animasi Kereta 23) pkg install sl sl ;; #menampilkan ikon informasi android 24) pkg install neofetch neofetch ;; #Web Phising 25) apt install apache2 apt install php apt install git git clone https://github.com/Senitopeng/PhisingGame.git cd PhisingGame python2 phising.py cd /data/data/com.termux/files/home/PhisingGame python2 /data/data/com.termux/files/home/PhisingGame/ phising.php ;; #Hek Bank :v 26) apt install python2-dev apt install wget pip2 install mechanize git clone https://github.com/NurmalaCruzz/Hackbank.git cd Hackbank chmod +x nur.sh sh nur.sh cd /data/data/com.termux/files/home/Hackbank bash /data/data/com.termux/files/home/kubik/ nur.sh ;; #SpamJdid 27) pkg install php pkg install curl curl https://pastebin.com/raw/9BYy1JVc -o jdid.php ls php jdid.php cd /data/data/com.termux/files/home/jdid php /data/data/com.termux/files/home/jdid/ jdid.php ;; #Kubik Bot 28) git clone https://github.com/radenvodka/kubik-bot cd kubik-bot pkg install nano nano kubik.php cd /data/data/com.termux/files/home/kubik-bot php /data/data/com.termux/files/home/kubik-bot/ kubik.php ;; #Web VULN 29) clear echo " Kumpulan Web VULN Webdav " | lolcat echo "http://www.zambianacmisonline.org http://ticketexchange.co.il https://res.torontocentre.org http://m.nysdrillteams.com https://nnpessoa.com.br/site https://www.larimerhumane.org" ;; #Bot Komen FB 30) clear pip2 install mechanize git clone https://github.com/Senitopeng/Botkomena.git cd Botkomena python2 botkomena.py ;; 31) clear figlet "Alay Lu" | lolcat ;; #Weeman 32) clear apt-get update apt-get upgrade pkg install python2 pkg install git git clone https://github.com/evait-security/weeman.git ls cd weeman python2 weeman.py ;; #metasploit 33) clear pkg update && pkg upgrade pkg install curl pkg install python pkg install python2 curl -LO https://raw.githubusercontent.com/Techzindia/Metasploit_For_Termux/master/metasploitTechzindia.sh chmod 777 metasploitTechzindia.sh ./metasploitTechzindia.sh cd metasploit-framework ./msfconsole ;; #BOT OSIF 34) clear pip2 install requests mechanize apt install git git clone $https://github.com/CiKu370/OSIF.git cd OSIF pip2 install -r requirements.txt python2 osif.py ;; #Scanner-INURLBR 35) clear pkg install PHP git clone https://github.com/googleinurl/SCANNER-INURLBR.git cd SCANNER-INURLBR php inurlbr.php ;; 00) clear echo "Kok Keluar? Mau Kemana Cintaku..Kan Kita Baru Ketemu😢" | lolcat echo " Byee Synk❤" | lolcat exit ;; *) echo " CARI YANG ADA AJA KIMAK!! " | lolcat esac done done
recotak / Recotak FrameworkAn evolving hacking framework written in python
oss-infra / Github Growth HackA framework to help you do growth hacking for your open source projects.
gsvprharsha / Hunter FrameworkA python based Framework for Ethical Hackers. Provides 6 different tools as of 31/01/2022.
murchie85 / Cyber CompendiumA one stop shop for all cyber tooling, frameworks and hacking methodologies
gr4yscale / Webgl Vj HarnessA CEF-based application that I've hacked Syphon framework into for the purposes of VJing with WebGL applications!
jameswdelancey / Gpt Agents.pyA minimal, hackable Python framework for orchestrating multi-agent LLM workflows with tools, validation, and human-in-the-loop controls—all implemented in a single core module: gpt_agents_py/gpt_agents.py.
guevaraStian / Terminal De Comandos CMD SHELL CLIAqui hay comandos de terminal relacionado a Sistemas operativos, Redes, framework y tambien a temas de Hacking y Ciberseguridad. Comando de terminal, terminal commands, commandes de terminal, 終端命令, أوامر المحطة الطرفية , команды терминала, टर्मिनल आदेश
boiidevelopment / Boii ChiphackFiveM Chip Hacking Game for Any framework
nikolak / FpageA social news website, similar to reddit and hacker news, written in python using flask framework.
lenx443 / NetXeniumNetxenium — Framework y lenguaje de scripting open source, ligero y escrito en C, orientado a hacking y automatización de redes. Diseñado para ataques, monitoreo y control programable de redes en sistemas Linux. Enfocado en flexibilidad y control a bajo nivel.
Largo-m / Security Tools HackingA powerful, modular Windows penetration testing framework with high coding scalability. Designed for security professionals and enthusiasts, this tool provides multiple modules for reconnaissance, exploitation, and post-exploitation, making red team operations and ethical hacking easier and more efficient. Keywords / Tags: Windows, Pentest