Compare commits

...

2 Commits

Author SHA1 Message Date
Jieyab89
ffb7ffbfbc update node list 2025-08-25 13:53:33 +07:00
Jieyab89
2f733bd012 added more resouces 2025-08-25 13:52:54 +07:00
2 changed files with 16 additions and 1 deletions

View File

@@ -856,6 +856,7 @@ Tips
You can find the file hash or other threat indicator
- [VMRay Sandbox](https://www.vmray.com/)
- [maltiverse](https://whatis.maltiverse.com/)
- [virusscan](https://virusscan.jotti.org/)
- [AnyRun](https://app.any.run/)
@@ -1230,6 +1231,7 @@ Web Defacement Archive
- [github](https://github.com)
- [pastebin](https://pastebin.com/)
- [databreach](https://databreach.com/)
- [leaking forum](https://leaking.cc/)
# Crack Jurnals
@@ -4563,10 +4565,11 @@ C2 & C4
- [mythic C2](https://docs.mythic-c2.net/installation)
- [Lki C2](https://github.com/boku7/Loki)
- [HAVOC](https://havocframework.com/)
- [AdaptixC2](https://github.com/Adaptix-Framework/AdaptixC2)
*Notes
There is C2 and C4 are paid and there is a validation and regulation for buying that tools
There is C2 and C4 are paid and there is a validation and regulation for buying that tools. FUD? There is FUD C2 and C4 or u can custom the payload with undocumented Windows API and mask u shell code
Linux Distro Tool Lists

View File

@@ -3083,6 +3083,10 @@
{
"name": "cyfirma",
"url": "https://www.cyfirma.com/"
},
{
"name": "VMRay Sandbox",
"url": "https://www.vmray.com/"
}
]
},
@@ -3972,6 +3976,10 @@
{
"name": "databreach",
"url": "https://databreach.com/"
},
{
"name": "leaking forum",
"url": "https://leaking.cc/"
}
]
},
@@ -15636,6 +15644,10 @@
{
"name": "SSH Pivoting",
"url": "https://cyberkhalid.github.io/posts/ssh-pivot/"
},
{
"name": "AdaptixC2",
"url": "https://github.com/Adaptix-Framework/AdaptixC2"
}
]
},