Exposed Ports An exposed port can be accessed using a proxy socks5 (https://www.kitploit.com/search/label/Socks5) client, SSH client, or HTTP client. Choose one for the best experience. Port 6080 (Access to attack network) Port 7080 (Access to defense network) Port 8080 (Access to monitor network) Example usage Access internal network with proxy socks5 curl --proxy socks5://ipaddress:6080 http://10.0.0.100/vnc.html curl --proxy socks5://ipaddress:7080 http://10.0.1.101/vnc.html curl --proxy socks5://ipaddress:8080 http://10.0.3.102/vnc.html Remote ssh with ssh client ssh kali@ipaddress -p 6080 (default password: attackpassword) ssh kali@ipaddress -p 7080 (default password: defensepassword) ssh kali@ipaddress -p 8080 (default password: monitorpassword) Access kali linux desktop with curl / browser curl http://ipaddress:6080/vnc.html curl http://ipaddress:7080/vnc.html curl http://ipaddress:8080/vnc.html Domain Access http://attack.lab/vnc.html (default password: attackpassword) http://defense.lab/vnc.html (default password: defensepassword) http://monitor.lab/vnc.html (default password: monitorpassword) https://gophish.lab:3333/ (default username: admin, default password: gophishpassword) https://server.lab/ (default username: [email protected], default passowrd: mailpassword) https://server.lab/iredadmin/ (default username: [email protected], default passowrd: mailpassword) https://mail.server.lab/ (default username: [email protected], default passowrd: mailpassword) https://mail.server.lab/iredadmin/ (default username: [email protected], default passowrd: mailpassword) http://phising.lab/ http://10.0.0.200:8081/ http://gitea.lab/ (default username: csalab, default password: giteapassword) http://dvwa.lab/ (default username: admin, default passowrd: password) http://dvwa-monitor.lab/ (default username: admin, default passowrd: password) http://dvwa-modsecurity.lab/ (default username: admin, default passowrd: password) http://wackopicko.lab/ http://juiceshop.lab/ https://wazuh-indexer.lab:9200/ (default username: admin, default passowrd: SecretPassword) https://wazuh-manager.lab/ https://wazuh-dashboard.lab:5601/ (default username: admin, default passowrd: SecretPassword) http://splunk.lab/ (default username: admin, default password: splunkpassword) https://infectionmonkey.lab:5000/ http://purpleops.lab/ (default username: [email protected], default password: purpleopspassword) http://caldera.lab/ (default username: red/blue, default password: calderapassword) Network / IP Address Attack 10.0.0.100 attack.lab 10.0.0.200 phising.lab 10.0.0.201 server.lab 10.0.0.201 mail.server.lab 10.0.0.202 gophish.lab 10.0.0.110 infectionmonkey.lab 10.0.0.111 mongodb.lab 10.0.0.112 purpleops.lab 10.0.0.113 caldera.lab Defense 10.0.1.101 defense.lab 10.0.1.10 dvwa.lab 10.0.1.13 wackopicko.lab 10.0.1.14 juiceshop.lab 10.0.1.20 gitea.lab 10.0.1.110 infectionmonkey.lab 10.0.1.112 purpleops.lab 10.0.1.113 caldera.lab Monitor 10.0.3.201 server.lab 10.0.3.201 mail.server.lab 10.0.3.9 mariadb.lab 10.0.3.10 dvwa.lab 10.0.3.11 dvwa-monitor.lab 10.0.3.12 dvwa-modsecurity.lab 10.0.3.102 monitor.lab 10.0.3.30 wazuh-manager.lab 10.0.3.31 wazuh-indexer.lab 10.0.3.32 wazuh-dashboard.lab 10.0.3.40 splunk.lab Public 10.0.2.101 defense.lab 10.0.2.13 wackopicko.lab Internet 10.0.4.102 monitor.lab 10.0.4.30 wazuh-manager.lab 10.0.4.32 wazuh-dashboard.lab 10.0.4.40 splunk.lab Internal 10.0.5.100 attack.lab 10.0.5.12 dvwa-modsecurity.lab 10.0.5.13 wackopicko.lab License This Docker Compose application is released under the MIT License. See the LICENSE (https://www.mit.edu/~amini/LICENSE.md) file for details.

Download Csaf (https://github.com/csalab-id/csaf)
Url-Status-Checker - Tool For Swiftly Checking The Status Of URLs
http://www.kitploit.com/2024/04/url-status-checker-tool-for-swiftly.html
Status Checker is a Python script that checks the status of one or multiple URLs/domains and categorizes them based on their HTTP status codes. Version 1.0.0 Created BY BLACK-SCORP10 www.tg-me.com/BLACK-SCORP10 (https://www.tg-me.com/BLACK_SCORP10)
Features Check the status of single or multiple URLs/domains. Asynchronous HTTP requests for improved performance. Color-coded output for better visualization of status codes. Progress bar when checking multiple URLs. Save results to an output file. Error handling for inaccessible URLs and invalid responses. Command-line interface for easy usage. Installation Clone the repository: bash git clone https://github.com/your_username/status-checker.git cd status-checker Install dependencies: bash pip install -r requirements.txt Usage python status_checker.py [-h] [-d DOMAIN] [-l LIST] [-o OUTPUT] [-v] [-update]
-d, --domain: Single domain/URL to check. -l, --list: File containing a list of domains/URLs to check. -o, --output: File to save the output. -v, --version: Display version information. -update: Update the tool. Example: python status_checker.py -l urls.txt -o results.txt
Preview:
License This project is licensed under the MIT License - see the LICENSE (https://github.com/BLACK-SCORP10/LICENSE) file for details.

Download Url-Status-Checker (https://github.com/BLACK-SCORP10/url-status-checker)
2024/04/28 00:23:06
Back to Top
HTML Embed Code: