-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtools.html
202 lines (179 loc) · 10.7 KB
/
tools.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Cyber Security</title>
<link rel="icon" type="image/x-icon" href="/favicon.png">
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.12.1/css/all.min.css"
integrity="sha256-mmgLkCYLUQbXn0B1SRqzHar6dCnv9oZFPEC1g1cwlkk=" crossorigin="anonymous" />
<link rel="stylesheet" href="style.css">
</head>
<body>
<!-- nav-bar -->
<section id="nav-bar" class="container">
<header class="nav-bar">
<div class="brand"><a href="index.html"><img src="images/logo.png" width="200" height="60" alt=""></a></div>
<div class="nav-list">
<div class="hamburger">
<div class="bar"></div>
</div>
<ul>
<br>
<li><a href="index.html">
<h6>About</h6>
</a></li>
<li><a href="index.html">
<h6>Threats</h6>
</a></li>
<li><a href="index.html">
<h6>Counter-Measures</h6>
</a></li>
<li><a href="index.html">
<h6>Do's and Dont's</h6>
</a></li>
<li><a href="tools.html">
<h6>Tools</h6>
</a></li>
</ul>
</div>
</header>
</section>
<!-- End nav-bar -->
<section id="t">
<div class="hello">
<div class="hello3">
<br>
<br>
<p style="margin-left:25%;"> <b>Some Cyber Secuirty Tools</b></p>
</div>
<hr>
<div class="hello4" style="clear: left;">
<p style="float: left;"><br><img src="images/tool1.jpeg" height="200" width="200"
border="1px" style="margin:0px 20px"></p>
<br>
<h2>Keylogger</h2>
<p><br>
<h3>
What Is a Keylogger?
Keyloggers or keystroke loggers are software programs or hardware devices that track the activities (keys pressed) of a keyboard. Keyloggers are a form of spyware where users are unaware their actions are being tracked. Keyloggers can be used for a variety of purposes; hackers may use them to maliciously gain access to your private information, while employers might use them to monitor employee activities. Some keyloggers can also capture your screen at random intervals; these are known as screen recorders. Keylogger software typically stores your keystrokes in a small file, which is either accessed later or automatically emailed to the person monitoring your actions.</h3>
</p><br>
<form action="keylogger.html" method="get" target="_blank">
<button target="_blank" type="submit" style="width: 150px; height: 50px; font-size: large;"> Download </button>
</form>
</div>
<hr>
<div class="hello4" style="clear: left;">
<p style="float: left;"><br><img src="images/tool5.jpeg" height="200" width="200"
border="1px" style="margin:0px 20px"></p>
<br>
<h2>Text Encryption-Decryption (Cipher)</h2>
<p><br>
<h3>Encryption is the process by which a readable message is converted to an unreadable form to prevent unauthorized parties from reading it. Decryption is the process of converting an encrypted message back to its original (readable) format. The original message is called the plaintext message. The encrypted message is called the ciphertext message.
Digital encryption algorithms work by manipulating the digital content of a plaintext message mathematically, using an encryption algorithm and a digital key to produce a ciphertext version of the message. The sender and recipient can communicate securely if the sender and recipient are the only ones who know the key.
</h3>
</p><br>
<form action="/ciphers/cipher.html" method="get" target="_blank">
<button target="_blank" type="submit" style="width: 150px; height: 50px; font-size: large;"> Download </button>
</form>
</div>
<hr>
<div class="hello4" style="clear: left;">
<p style="float: left;"><br><img src="images/tool3.jpeg" height="200" width="200"
border="1px" style="margin:0px 20px"></p>
<br>
<h2>Reverse Shell</h2>
<p><br>
<h3>There are many ways to gain control over a compromised system. A common practice is to gain interactive shell access, which enables you to try to gain complete control of the operating system. However, most basic firewalls block direct remote connections. One of the methods to bypass this is to use reverse shells.
A reverse shell is a program that executes local cmd.exe (for Windows) or bash/zsh (for Unix-like) commands and sends the output to a remote machine. With a reverse shell, the target machine initiates the connection to the attacker machine, and the attacker's machine listens for incoming connections on a specified port; this will bypass firewalls.
</h3>
</p><br>
<form action="/reverseshell.html" method="get" target="_blank">
<button target="_blank" type="submit" style="width: 150px; height: 50px; font-size: large;"> Download </button>
</form>
</div>
<hr>
<div class="hello4" style="clear: left;">
<p style="float: left;"><br><img src="macchanger/1.png" height="200" width="200"
border="1px" style="margin:0px 20px"></p>
<br>
<h2>MAC Address Changer (For Linux OS only)</h2>
<p><br>
<h3>In a computer network, the MAC Address is used at the lowest networking level,where network interfaces
communicate with one another.<br>
Need of changing MAC Address:
to bypass MAC Address filtering,
to bypass certain kind of MITM spoofing attack,
to avoid device tracking in a public network.
There are many other tasks like becoming anonymous in a network and to avoid some network attacks
where changing MAC Address becomes useful.</h3>
</p><br>
<form action="/macchanger.html" method="get" target="_blank">
<button target="_blank" type="submit" style="width: 150px; height: 50px; font-size: large;"> Download </button>
</form>
</div>
<hr>
<div class="hello4" style="clear: left;">
<p style="float: left;"><br><img src="images/tool6.png" height="200" width="200"
border="1px" style="margin:0px 20px"></p>
<br>
<h2>Image Steganography</h2>
<p><br>
<h3>Steganography is the art of hiding a message inside another message. In this case we will hide a text message inside an image. An image will most propably go unnotified, not a bunch of people will suspect a message hidden inside an image. Steganography is no means of encryption, just a way of hiding data inside an image.</h3>
</p><br>
<form action="image-stgn/image-stegno.html" method="get" target="_blank">
<button target="_blank" type="submit" style="width: 150px; height: 50px; font-size: large;"> Download </button>
</form>
</div>
<hr>
<div class="hello4" style="clear: left;">
<p style="float: left;"><img src="images/tool7.jpeg" height="200" width="200"
border="1px" style="margin:0px 20px"></p>
<br>
<h2>Cyber Attact Impact Assessment </h2>
<p><br><br>
<h3>Tools such as anti-virus software, biometrics and personal
devices, e.g., the secure chip in a credit card or an ePassport
are digital security devices because they offer freedom to
communicate, work, travel and shop using your digital
identity in a way that is secure.
Digital security is an all-encompassing term, which includes
the tools to secure technology, assets and personal identity in
the online and mobile world.</h3>
</p><br>
<form action="Risk-calculator/OWASP RISK CALCULATOR.html" method="get" target="_blank">
<button target="_blank" type="submit" style="width: 150px; height: 50px; font-size: large;"> Download </button>
</form>
</div>
<hr>
</div>
</section>
<!-- Hire Section -->
<section id="hire" class="hire container">
<h1 class="hire-heading">If you need any kind of help regarding Cyber Security, Kindly</h1>
<a href="https://cybercrime.gov.in/" target="_blank" type="button" class="hire-button">Click Here</a>
</section>
<!-- End Hire Section -->
<!-- Footer section -->
<footer id="footer" class="footer container">
<div class="footer-contact">
<h1 class="footer-contact-heading">Contact Me</h1>
<p class="footer-contact-info">Email: ibrahimsaleem9123@gmail.com</p>
<p class="footer-contact-info">Mobile: +91 722 399 0578</p>
</div>
<div class="footer-social-follow">
<h1 class="footer-social-follow-heading">Follow Me</h1>
<div class="footer-social-icon">
<a href="https://facebook.com/" target="_blank"><i class="fab fa-facebook"></i></a>
<a href="https://instagram.com/" target="_blank"><i class="fab fa-instagram-square"></i></a>
<a href="https://twitter.com/" target="_blank"><i class="fab fa-twitter-square"></i></a>
</div>
</div>
<footer style="text-align: center; margin-top: 20px; margin-bottom: 10px; color: rgb(255, 255, 255);">
© 2022 by <a href="mailto:ibrahimsaleem9123@gmail.com">Ibrahim Saleem</a>
</footer>
</footer>
<!-- End Footer section -->
<script src="./app.js"></script>
</body>
</html>