Black Windows 10 V2

 
 

$150.00

Description

Black Windows 10 V2Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system and it offers the hacking part with a Cerberus Linux system! You can run both and it just Linux:All tools from Cerberus os!15 new Cerberus Frameworks :Metapackages , containers with custom scripts within!Exploits (to analyze):EARLYSHOVEL RedHat 7.0 – 7.1 Sendmail 8.11.x exploitEBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86.ECHOWRECKER remote Samba 3.0.x Linux exploit.EASYBEE appears to be an MDaemon email server vulnerabilityEASYFUN EasyFun 2.2.0 Exploit for WDaemon / IIS MDaemon/WorldClient pre 9.5.6EASYPI is an IBM Lotus Notes exploit that gets detected as StuxnetEWOKFRENZY is an exploit for IBM Lotus Domino 6.5.4 & 7.0.2EXPLODINGCAN is an IIS 6.0 exploit that creates a remote backdoorETERNALROMANCE is a SMB1 exploit over TCP port 445 which targets XP, 2003, Vista, 7, Windows 8, 2008, 2008 R2, and gives SYSTEM privileges (MS17-010)EDUCATEDSCHOLAR is a SMB exploit (MS09-050)

EMERALDTHREAD is a SMB exploit for Windows XP and Server 2003 (MS10-061)EMPHASISMINE is a remote IMAP exploit for IBM Lotus Domino 6.6.4 to 8.5.2ENGLISHMANSDENTIST sets Outlook Exchange WebAccess rules to trigger executable code on the client’s side to send an email to other usersEPICHERO 0-day exploit (RCE) for Avaya Call ServerERRATICGOPHER is a SMBv1 exploit targeting Windows XP and Server 2003ETERNALSYNERGY is a SMBv3 remote code execution flaw for Windows 8 and Server 2012 SP0 (MS17-010)ETERNALBLUE is a SMBv2 exploit for Windows 7 SP1 (MS17-010)ETERNALCHAMPION is a SMBv1 exploitESKIMOROLL is a Kerberos exploit targeting 2000, 2003, 2008 and 2008 R2 domain controllersESTEEMAUDIT is an RDP exploit and backdoor for Windows Server 2003ECLIPSEDWING is an RCE exploit for the Server service in Windows Server 2008 and later (MS08-067)ETRE is an exploit for IMail 8.10 to 8.22ETCETERABLUE is an exploit for IMail 7.04 to 8.05FUZZBUNCH is an exploit framework, similar to MetaSploitODDJOB is an implant builder and C&C server that can deliver exploits for Windows 2000 and later, also not detected by any AV vendorsEXPIREDPAYCHECK IIS6 exploitEAGERLEVER NBT/SMB exploit for Windows NT4.0, 2000, XP SP1 & SP2, 2003 SP1 & Base ReleaseEASYFUN WordClient / IIS6.0 exploitESSAYKEYNOTEEVADEFREDUtilities:PASSFREELY utility which “Bypasses authentication for Oracle servers”SMBTOUCH check if the target is vulnerable to samba exploits like ETERNALSYNERGY, ETERNALBLUE, ETERNALROMANCEERRATICGOPHERTOUCH Check if the target is running some RPCIISTOUCH check if the running IIS version is vulnerableRPCOUTCH get info about windows via RPCDOPU used to connect to machines exploited by ETERNALCHAMPIONSNAMEDPIPETOUCH Utility to test for a predefined list of named pipes, mostly AV detection. User can add checks for custom named pipes.Scripts Arsenal and Wine Arsenal:3vilTwinAttacker911ara2svadminfinderAdminPageADSLPT-WPAwifi-breakeraircracktestairfree-wtairgeddonAirlinairmodeAirodump_Scan_Visualizerairport-snifferairsslairstorm

Airvengersagryfuzzeranonsurfanon-manageranonymizeranon-surf-startanon-surf-stopapfuckerapk-payload-generatorapt2ARCANUSarmitageasleapatscanautoDANEautohsguiautomaterAutoNessusautopixieauto-reaverautorelayavetbackdoor-apkbackdoormebackdoorpptBAFBase64ImageEncoder-DecoderBatchVirusGeneratorBatch-Virus-Generatorbelkin4xxbelkin-wpspinBinGooBlackFilePumperBlindSqliBoopSuiteBrutalBruteSploitbrutesprayBruteXBrutusV4.7BTIHTMLEncoder-DecoderBTIMultiSiteCheckerBTIReverseIPDomainCheckbullycangibrinakerbnmapCewlanon-change-identityCHAOSchap2asleapchapcrackChap-CrackCloudFailCloudFlareResolverCMSmapcobaltstrikecowpattyCpanelBruteReilukecracklecrackleCrackTheCAPprobewpacrackercredmapcriptatorcrowbarcrunchcsrfpocmakerCVE-2017-0199CVE-2017-7494cybersacDagondedsploitDefacePageCreateddkmcdlinkdecrypterdomainhunterDorkFinderDorktoolsdotdotpwndoublepulsar-detectiond-tecteapmd5hcgenEaSTEbowlaEggShellejacoolaserratasecEternalblue-Doublepulsar-MetasploitescanEternalsExtensionSpooferEvilAPDefenderevil-droidExploitOnCLIexploitpackexploitsExploitScannerExtension_SpooferezDataBase_DefacerezsploitF.SocietyFakearfakeAPfake-ap3.pyFakeAp2FakeImageExploiterfibercrunchFindsploitfipyfirefox-ramgufwanonsurffluxiongcatgeneradorDicciogenkeysgenpmkGenpygetsploitGhostInTheNetGhost-fishergigawordlistGloom-FrameworkGoohakhakkuframeworkHalcyonhandshake-extractorHandShakerHash-BusterhashcatguihccaphellraiserHellWormsGeneratorHer0xDa-Wps-CrackerHighLifeCrypterhostnamechangerhotspot_autologinHT-WPS-Breakerhydra-wizardIllusi0nCrypterImage+TextFileBinderImageWormInfamousToolInfogaInjectoristInsanity-FrameworkInstaBruteipscan-win32-3_2IpToolisfisthisipbadJazztel-StopGoJoomla_Security_Scannerjsql-injection-v0_2_jarKatanaFrameworkkillchainkimikoadickwetzaLALINLANs.pyLegionEliteProxiesGrabberleviathanLFiExploiterLFiFreakLFISuiteliffyLinDroplitesploitmac2wepkeymacchangerMakeWordlistForBruteMaskgenMassBleedMassDorkScannermassExpConsoleMatroschkaMaXIsploitmd5crackmergedictMeterpreter_Paranoid_Mode-SSLMITMfmitm-rogue-WiFi-APMooreRPortScannermorpheusmorphHTAmpcms17msfvenom_custom_encodingnetattack2netdiscover-0.3-pre-beta7netool-toolkitnetsec-frameworkNetZapperNoSQLMapnps_payloadnsaNSA-exploitsnsa-guiNXcryptONO_Netgear_WPA2_Hackoperative-frameworkOSPTFOWASP-Nettackerp0iz0nProxyProcessorpandora-managerpastezortpasv-agrsvPAYLOAD-MAKERPenBoxpenetrator-wpspenmodepentesting-multitoolpentestlypentest-machinePiWATpixiewpsPolicygenportSpiderPowerScript-KatanaFrameworkPr0xYGrabberPRETProPortProxyFinderPureNetworksPybeltPyBozoCrackpydictorpython_gdork_sqlipython-hacklibpyxiewps_WPSpyxiewps_WPShack-PythonQuackreaverreaver.rdreaver-spoofreaver-webuireaver-wps-fork-t6x-masterReconDogRED_HAWKreGeorgriwifshellRt2rtcRtc2rtRtgenRtsortRulegensaintscanlessscapy-deauthscythianSEFsgenShadowBatchVirusGenMODshellsploitshockerShockLabsFileBindershodanwaveSigPloitSimpleBindersimple-duckysmapsmodSn1perSPFSpiderMailSQLExploitScannerSqliColCountSQLiDumpersqlihelperv_2_7sqli-scannersqlitebrowsersqlivsqliscanSQL-nightmareanon-i2p-startStitchanon-i2p-stopString-generatorStruts2ShellSublist3rSuperMicro-Password-ScannerTeraBitClientThe-Auto-PentestfatrattheharvesterguiTNscantorghosttor_ip_switchertoriptables2TPLink-AttackDictionarytplmaptrapeTripleX-CrypterTritytulparTuxCut417U-CrackerUmbrellaV3n0MVanquishvarmacreaversav9-93varmacscan2-8VBSVirusMakerVbswgVeil-Ordnancevenomdroid3Virus-O-MaticviSQLVMR-MDKw3afwaidpsWarChildWeBaCoowebpwnWebscanweemanwePWNiseWi-fEyewifiarnetwifiarpwifi-autopwnerwifi_checkwifi-contourwificursewifidnswifi-hackerwifi-harvesterwifi-honeywifijammerwifi-linux-rssiwifimonsterwifiphisherwifipingWifiScanAndMapwifitapwifitewifite2wifite-mod-pixiewpsWifite_ngwifuzzwiki_wordlist_generatorWinpayloadswireless-idswireless-infoWireless-Snifferwirespywlanreaverwordlist50word-list-compressWordlistswordpress-exploit-frameworkWormGenWPA2-HalfHandshake-Crackwpa-autopwnwpa-bruteforcerwpacleanWpspinwpa-extractorwpaforhashcatwperfwps-connectwpscrackwpsdbWPSIGwpspinWPSPINWpspingeneratorwps_scannerwsuxploitwwcleanerXAttackerxerosploitxerxes-dosxpathxsscrapyXssPyXSSTracerXSStrikezarpZeusCrypterzirikatuExtra Tools:DandenSpritzFuzzBunchMore tools:acccheckace-voipAmapAutomaterbing-ip2hostsbraaCaseFileCDPSnarfcisco-torchCookie Cadgercopy-router-configDMitrydnmapdnsenumdnsmapDNSRecondnstracerdnswalkDotDotPwnenum4linuxenumIAXFaradayFierceFirewalkfragroutefragrouterGhost PhisherGoLismerogoofilehping3ident-user-enumInTraceiSMTPlbdMaltego TeethmasscanMetagoofilMirandanbtscan-unixwizNmapntopp0fParseroRecon-ngSETsmtp-user-enumsnmp-checkSPARTAsslcauditSSLsplitsslstripSSLyzeTHC-IPV6theHarvesterTLSSLedtwofiURLCrazyWiresharkWOL-EXplicoVulnerability AnalysisBBQSQLBEDcisco-auditing-toolcisco-global-exploitercisco-ocscisco-torchcopy-router-configDBPwAuditDoonaDotDotPwnHexorBaseIngumajSQLLynisNmapohrwurmOscannerPowerfuzzersfuzzSidGuesserSIPArmyKnifesqlmapSqlninjasqlsusTHC-IPV6tnscmd10gunix-privesc-checkYersiniaExploitation ToolsArmitageBackdoor FactoryBeEFcisco-auditing-toolcisco-global-exploitercisco-ocscisco-torchCommixcrackleexploitdbjboss-autopwnLinux Exploit SuggesterMaltego TeethMetasploit FrameworkRouterSploitSETShellNoobsqlmapTHC-IPV6YersiniaWireless AttacksAircrack-ngAsleapBluelogBlueMahoBluepotBlueRangerBluesnarferBullycoWPAttycrackleeapmd5passFern Wifi CrackerGhost PhisherGISKismetGqrxgr-scanhostapd-wpekalibrate-rtlKillerBeeKismetmdk3mfcukmfocmftermMultimon-NGPixieWPSReaverredfangRTLSDR ScannerSpooftoophWifi HoneywifiphisherWifitapWifiteForensics ToolsICQ: : PasswordBlackWindowOs

https://mega.nz/#!eIAkVILJ!H_tHgHkLNUJeC6tInHypKxfpXmZ62IxcfkqbNKK4p4o
https://mega.nz/#!SAAw1KrL!Dd2-kFoAweT4lDQkTTrUxFGf9KwUA0fBxVaf5ylZK1M
https://mega.nz/#!OYBiBCKL!XxQ2zBB6PYoKVsc5rTIKqE4A7yhBtllbJIkCnIGVmOQ

Reviews

There are no reviews yet.

Be the first to review “Black Windows 10 V2”

Your email address will not be published. Required fields are marked *

Category: