• Hello, We are looking for Uploaders / Moderators for our forum soft4win. If you intrested please >>Read Here<<

VIP Black Window Enterprise 10 v2 - Windows-based pentesting distribution

Ziblacking

Moderator
Moderator
Verified user
maxresdefault (1).jpg

description.png

Black Window Enterprise 10 v2 - Windows-based pentesting distribution with integrated Linux. The system comes with a digital license for Windows Enterprise! It supports Windows and Linux applications, GUI and terminal applications! It comes with a hacking tool tone plus all the tools that are included with the latest version of Cerberus Linux. It has managed to deploy Cerberus os within Windows. It offers the stability of a Windows system.

file_information.png

Black Window Enterprise 10 v2
Peso: 28.9 GB | Idioma: Ingles | Licencia: Kms |

features.png

Windows:
• Armitage
• Metasploit
• Fuzzbunch
• Dandensprits
• Ip hiders
• Wifi hacking
• Crackers
• Cypters and Binders
• Dork Scanners
• Dos+DDoser++Flooders
• Forensic Tools
• over 100 new KeyLoggers updated
• Misc. Web Tools
• over 50 new SQL Injection tools updated
• over 50 new Network Tools updated
• over 100 RAT’ s updated
• SMS & Email Bombers
• VPNs & Security
• Admin Page-Login Page Scanners
• Proxy Grabbers
• Resolvers
• Scripts & Source Codes
• Shells
• Vulnerable Scanners
• Worms, Malware, & Virus Makers
• Entire Elcomsoft

Linux:
• All tools from Cerberus os!
• 15 new Cerberus Frameworks :
• Metapackages , containers with custom scripts within!

Exploits (to analyze):
• EARLYSHOVEL RedHat 7.0 – 7.1 Sendmail 8.11.x exploit
• EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86.
• ECHOWRECKER remote Samba 3.0.x Linux exploit.
• EASYBEE appears to be an MDaemon email server vulnerability
• EASYFUN EasyFun 2.2.0 Exploit for WDaemon / IIS MDaemon/WorldClient pre 9.5.6
• EASYPI is an IBM Lotus Notes exploit that gets detected as Stuxnet
• EWOKFRENZY is an exploit for IBM Lotus Domino 6.5.4 & 7.0.2
• EXPLODINGCAN is an IIS 6.0 exploit that creates a remote backdoor
• ETERNALROMANCE is a SMB1 exploit over TCP port 445 which targets XP, 2003, Vista, 7, Windows 8, 2008, 2008 R2, and gives SYSTEM privileges (MS17-010)
• EDUCATEDSCHOLAR is a SMB exploit (MS09-050)
• EMERALDTHREAD is a SMB exploit for Windows XP and Server 2003 (MS10-061)
• EMPHASISMINE is a remote IMAP exploit for IBM Lotus Domino 6.6.4 to 8.5.2
• ENGLISHMANSDENTIST sets Outlook Exchange WebAccess rules to trigger executable code on the client’s side to send an email to other users
• EPICHERO 0-day exploit (RCE) for Avaya Call Server
• ERRATICGOPHER is a SMBv1 exploit targeting Windows XP and Server 2003
• ETERNALSYNERGY is a SMBv3 remote code execution flaw for Windows 8 and Server 2012 SP0 (MS17-010)
• ETERNALBLUE is a SMBv2 exploit for Windows 7 SP1 (MS17-010)
• ETERNALCHAMPION is a SMBv1 exploit
• ESKIMOROLL is a Kerberos exploit targeting 2000, 2003, 2008 and 2008 R2 domain controllers
• ESTEEMAUDIT is an RDP exploit and backdoor for Windows Server 2003
• ECLIPSEDWING is an RCE exploit for the Server service in Windows Server 2008 and later (MS08-067)
• ETRE is an exploit for IMail 8.10 to 8.22
• ETCETERABLUE is an exploit for IMail 7.04 to 8.05
• FUZZBUNCH is an exploit framework, similar to MetaSploit
• ODDJOB is an implant builder and C&C server that can deliver exploits for Windows 2000 and later, also not detected by any AV vendors
• EXPIREDPAYCHECK IIS6 exploit
• EAGERLEVER NBT/SMB exploit for Windows NT4.0, 2000, XP SP1 & SP2, 2003 SP1 & Base Release
• EASYFUN WordClient / IIS6.0 exploit
• ESSAYKEYNOTE
• EVADEFRED

Utilities:
• PASSFREELY utility which “Bypasses authentication for Oracle servers”
• SMBTOUCH check if the target is vulnerable to samba exploits like ETERNALSYNERGY, ETERNALBLUE, ETERNALROMANCE
• ERRATICGOPHERTOUCH Check if the target is running some RPC
• IISTOUCH check if the running IIS version is vulnerable
• RPCOUTCH get info about windows via RPC
• DOPU used to connect to machines exploited by ETERNALCHAMPIONS
• NAMEDPIPETOUCH Utility to test for a predefined list of named pipes, mostly AV detection. User can add checks for custom named pipes.

Scripts Arsenal and Wine Arsenal:
• Nsa Tools
• Vulnerability Analysis
• Exploitation Tools
• Wireless Attacks
• Forensics Tools
• Web Applications
• Stress Testing
• Sniffing & Spoofing
• Password Attacks
• Maintaining Access
• Hardware Hacking

screenshots.png

Black Window Enterprise 10 - Distribución de penetration testing basada en Windows_www_bacteri...PNG

system_requirements.png

Processor: 3 GHz or faster processor or system-on-a-chip (SoC)
RAM: 4 GB
Hard disk space: 120 GB
Graphics card: DirectX 9 or later with a WDDM 1.0 driver
Display: 800×600
Internet connection
Latest operating system: Make sure you are running the latest version: Windows 7 SP1 or Windows 8.1 Update

download.png


 
Last edited:

Wiper

Verified user
Verified user
Bronze
@Ziblacking First of all - thank you very much. I'm glad that I was able to help this site by becoming a measly "Bronze", and it was mainly because of you and this piece of work.

And now to anyone - has anyone been able to download this? The first time I tried it quit on me after day and half of downloading at 15 GB (IDM kept "Send get..." for hours). I retried. The second time it stalled on 2,5 GB - the same thing... It's been like that for hours now...

Is OneDrive the only solution for you? I don't mean any disrespect or to be ungrateful, but there are so many great clouds out there...

With regards and all respect,
Wiper
 

Ziblacking

Moderator
Moderator
Verified user
@Wiper In a few hours I will upload the file in other clouds for download, also try to download without using IDM so that it does not crash due to the weight
 
Last edited:
Top