Jump to content

Search the Community

Showing results for tags 'tools'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 10 results

  1. Hello all, I'm currently in my last year of a "Networking & Security" study in The Netherlands. To finish my education I'm currently working on a graduation project where I'm looking to set-up a "system" that, when a SALT state has been altered, runs this on a test machine which then runs a security compliance scan (based on predefined baselines (like SCAP or XCCF)) or a vulnerability (CVE's) scan on the "new" configuration. For this I've been looking at existing tools that perform these types of scans (OpenSCAP, CIS-CAT, Nessus, OpenVas), but I was wondering if any of you know
  2. Hi all, Does anyone have experience with getting a Metasploitable3 VM up and running in Proxmox VE? I'd prefer not to run VirtualBox if I can avoid it, and Proxmox has been awesome for everything else I've done in a lab environment. Alternately, is there a package that can be run against a vanilla windows 2008 server and / or ubuntu 14.04 server to set it up as a Metasploitable3 target? Thanks
  3. I'm trying to install impacket and responder to my BB using the .deb files provided on another thread however, my bunny doesn't seem to recognise the updated tools folder. When I copy the files, eject and plug back in, it just boots as normal and doesn't copy anything to its /tools on its linux partition. I found a previous thread saying to delete the everything, change the version.txt file to an earlier version and run the updater but I don't wanna mess it up any more than it already is. I've tried restoring by inducing 3 failed boots to restore to factory but that hasn't seemed to
  4. Phil.P

    Python Tools

    Hi, I can see from the requiretool.sh that you can see REQUIRETOOL impacket if you wanted the impacket tool to be installed. So to install python3 I assume it would be REQUIRETOOL python3 now say a tool requires pip install, how would this work? pip install xxxx Any help greatly appreaciated.
  5. On firmware 1.5, what is the proper tools directory to be placing tools like responder, metasploit, impacket, etc in ??? Is it /root/tools or /tools ? I installed metasploit, responder, and impacket in /root/tools and I am wondering if that is the proper location. Seeing as how the structure has changed from firmware to firmware.
  6. Hey, I have made a group to build, programs, tools, payloads, etc. If you have an idea or want to commute just take a look at the GitHub: https://github.com/CIPH3R0/C1PH3R C1PH3R
  7. After following the guide for 'unblocking' my bash bunny, I have been unable to install any of the tools. I have verified the tools are not installed by looking in the tools folder on the lines side and using payloads that require specific tools like Responder. I've gone through the standard instructions for installing tools... put the bash dummy in arming mode, transfer the files into the 'tools' folder, safely eject, and reinsert while still in arming mode. When I do this, the bash bunny just boots like normal. The led never goes magenta and the files are still in the 'tools' folder.
  8. REDD

    [PAYLOAD] AVKill

    Eh, I haven't been too active in awhile due to work so I figured I'd post one from my collection. AVKill - BashBunny -Ar1k88 This script was based off the Metasploit ruby code of "avkill". I just rewrote it for BashBunny. Payload.txt #!/bin/bash # # Title: AVKill # Author: Ar1k88 # Version: 1.2.1 # Target: Windows 7-10 # # O===================O=================== # | Magenta | Setup # | Yellow | Excuting Script # | Green/Success | Script Completed # | Cyan | Cleaning Up/ # | | | Shut
  9. Guys I just got my BB and I updated it to the latest firmware and I downloaded all the payloads but none of them works (more specifically they create an empty folder in "loots" with the name of the payload )... I assumed it was because I didn't have any tools.... so I downloaded all of the tools from the " hak5 forums" ... and in order for the tools to install I should unplug and plug my BB in arming mode again) but every time I open my " tools " folder in my BB it's empty ( despite I downloaded them several times) ...what is the problem?.... what should I do? PS ( I'm working with windo
  10. Guys I downloaded all the 3 tools in the forum but I don't know if they are installed or not and by the way non of the payloads are working
×
×
  • Create New...