Access premium red team, blue team, and ethical hacking resources developed by industry experts.
Defensive security exercises, SIEM configurations, incident response scenarios, and threat hunting techniques.
Advanced penetration testing, vulnerability assessment, exploitation techniques, and post-exploitation modules.
Powerful automation scripts for Kali Linux and Parrot OS covering various cybersecurity domains.
Automates alert correlation and incident response for Splunk and ELK stack.
#!/bin/bash
# SIEM Automation Script for Splunk
# This script automates alert correlation and incident response
LOG_DIR="/var/log/siem/"
THRESHOLD=10
ALERT_FILE="/opt/siem/alerts/critical_alert.log"
# Monitor failed login attempts
monitor_failed_logins() {
tail -f $LOG_DIR/auth.log | grep "Failed password" | while read line; do
username=$(echo $line | grep -oP 'for \K\S+')
ip=$(echo $line | grep -oP 'from \K\S+')
count=$(grep -c "Failed password for $username from $ip" $LOG_DIR/auth.log)
if [ $count -gt $THRESHOLD ]; then
echo "$(date): Brute force attempt detected: User: $username, IP: $ip, Attempts: $count" >> $ALERT_FILE
# Add automatic blocking rule
iptables -A INPUT -s $ip -j DROP
# Send alert
echo "Brute force attempt detected. IP $ip blocked." | mail -s "SIEM Alert: Brute Force" admin@company.com
fi
done
}
# Execute monitoring
monitor_failed_logins
Stealth network reconnaissance and vulnerability identification tool.
#!/usr/bin/env python3
# Advanced Network Scanner with stealth capabilities
import scapy.all as scapy
import socket
import threading
from queue import Queue
print_lock = threading.Lock()
target = input("Enter target IP or range: ")
ports = range(1, 1000) # Customize port range
stealth_mode = True # Use stealth scanning techniques
def scan(port):
try:
if stealth_mode:
# Stealth SYN scan
syn_packet = scapy.IP(dst=target)/scapy.TCP(dport=port, flags="S")
resp = scapy.sr1(syn_packet, timeout=1, verbose=0)
if resp and resp.haslayer(scapy.TCP):
if resp.getlayer(scapy.TCP).flags == 0x12: SYN-ACK
# Send RST to close connection
scapy.send(scapy.IP(dst=target)/scapy.TCP(dport=port, flags="R"), verbose=0)
with print_lock:
print(f"[+] Port {port} is open")
else:
# Regular connect scan
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.settimeout(1)
result = s.connect_ex((target, port))
if result == 0:
with print_lock:
print(f"[+] Port {port} is open")
s.close()
except Exception as e:
pass
def threader():
while True:
worker = q.get()
scan(worker)
q.task_done()
q = Queue()
for x in range(100): # Number of threads
t = threading.Thread(target=threader)
t.daemon = True
t.start()
for worker in ports:
q.put(worker)
q.join()
Comprehensive web application security testing tool.
#!/usr/bin/env python3
# Web Vulnerability Scanner for ethical hacking assessments
import requests
from urllib.parse import urljoin
from bs4 import BeautifulSoup
class WebVulnScanner:
def __init__(self, url):
self.target_url = url
self.session = requests.Session()
self.links_to_ignore = [] # Add URLs to ignore
self.vulnerabilities = []
def extract_links(self, url):
try:
response = self.session.get(url, timeout=5)
soup = BeautifulSoup(response.content, "html.parser")
return [urljoin(url, link.get("href")) for link in soup.findAll("a")]
except:
return []
def crawl(self, url=None):
if url is None:
url = self.target_url
href_links = self.extract_links(url)
for link in href_links:
if link not in self.links_to_ignore and self.target_url in link:
self.links_to_ignore.append(link)
print(f"[*] Crawling: {link}")
self.crawl(link)
def scan_xss(self):
print("[*] Testing for XSS vulnerabilities...")
test_script = ""
forms = self.extract_forms(self.target_url)
for form in forms:
content = self.test_xss_in_form(form, test_script)
if test_script in content:
self.vulnerabilities.append(("XSS", form.action, form.method))
def extract_forms(self, url):
response = self.session.get(url)
soup = BeautifulSoup(response.content, "html.parser")
return soup.findAll("form")
def test_xss_in_form(self, form, test_script):
action = form.get("action")
method = form.get("method", "get")
inputs_list = form.findAll("input")
data = {}
for input_field in inputs_list:
name = input_field.get("name")
type_ = input_field.get("type", "text")
if type_ == "text":
data[name] = test_script
if method.lower() == "post":
response = self.session.post(action, data=data)
else:
response = self.session.get(action, params=data)
return response.content.decode()
def run_scan(self):
print(f"[*] Starting scan on {self.target_url}")
self.crawl()
self.scan_xss()
if self.vulnerabilities:
print("[!] Vulnerabilities found:")
for vuln in self.vulnerabilities:
print(f" - {vuln[0]} at {vuln[1]} ({vuln[2]})")
else:
print("[+] No vulnerabilities detected")
if __name__ == "__main__":
target = input("Enter target URL: ")
scanner = WebVulnScanner(target)
scanner.run_scan()
Note: These are simplified examples. Full scripts are available to subscribers.
Gain access to our complete library of cybersecurity labs, scripts, and resources.
0.05 ETH
0.02 ETH
0.05 ETH
Send exactly 0.02 ETH (erc-20) to the following address:
0x398f5c94010cf4b4ee40e2cf617490be0053c0b0
After payment, email your transaction hash to bettarap254@gmail.com with your Discord username to receive your access code.