Windows crypto-ransomware POC

Ransomware

Windows crypto-ransomware POC Credits: mauri870 Note: This project is purely academic, use at your own risk. I do not encourage in any way the use of this software illegally or to attack targets without their previous authorization The intent here is to disseminate and teach more about security in the actual world. Remember, security is … Read more

Simple Keylogger – A simple keylogger for Windows, Linux and Mac

Simple Keylogger – A simple keylogger for Windows, Linux and Mac Credits: GiacomoLaw Welcome to the simple keylogger repo! A keylogger is a program that records your keystrokes, and this program saves them in a log file on your local computer. Check out below to learn how to install them. These keyloggers are simple and … Read more

CloudFail – Utilize misconfigured DNS Find hidden IP’s behind the CloudFlare network

cloudfail

CloudFail – Utilize misconfigured DNS Find hidden IP’s behind the CloudFlare network Credits: m0rtem CloudFail is a tactical reconnaissance tool that aims to gather enough information about a target protected by Cloudflare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has … Read more

State of Surveillance with Edward Snowden and Shane Smith (Vice) on HBO

edward-snowden

State of Surveillance with Edward Snowden and Shane Smith (Vice) on HBO

In the following video Vice’s Shane Smith heads to Moscow to meet and interview NSA whistle blower Edward Snowden about digital privacy and security. This year, when Apple refused an FBI court order to access the iPhone of suspected San Bernardino Terrorist Syed Farook.

Video Credit: Vice

 

Play Music HTML5 Audio XSS Payload

XSS Payload

Play Music HTML5 Audio XSS Payload The script below allows you to share your favorite mp3 through your target browser. Let’s assume the XSS payload was injected into a web page that supports unrestricted HTML an mp3 audio file would then play to the visitors of the compromised web page. if(document.getElementById(‘xss_audio’) == null ) { … Read more

TP-Link router brute force XSS Payload

  TP-Link router brute force XSS Payload Based on the WebRTC mechanism to gather IP addresses, this script attempts to perform a dictionnary attack against TP-Link routers login and password. It just requires to define a more realistic dictionary. Payload Author: Kamil Vavra [php]function detectFirefox() { if (navigator.userAgent.toLowerCase().indexOf(‘firefox’) > -1) { //Do Firefox-related activities getLocalIP(); … Read more

EAPHammer – Targeted Evil Twin Attacks WPA2-Enterprise Networks

eaphammer-2

EAPHammer – Targeted Evil Twin Attacks WPA2-Enterprise Networks EAPHammer is a toolkit designed by Gabriel Ryan (s0lst1c3) for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope wireless assessments and red team engagements. As such, focus is placed on providing an easy-to-use interface that can be leveraged … Read more

Makemon – Create Single or Multiple Monitor Mode WiFi Interfaces

Makemon Make a single (or up to 10) monitor mode wireless interfaces with unique mac addresses. Credits: Yo-kai-Sei-shin-kage # makemon by Yokai Seishinkage # Make a single (or up to 10) monitor mode wireless interfaces with unique mac addresses. Dependencies 1.) iw 2.) macchanger Installation Move “makemon” to “/usr/bin/” directory/folder or any directory you choose … Read more

Create Customized .onion Addresses For Tor Hidden Services

tor

Create Customized .onion Addresses For Tor Hidden Services Tor’s .onion links can often look quite random in this article I will show you how to create customized .onion address for use with Tor’s hidden services. Customized .onion links can often help other Tor users find and recognize your site easier. For example take Facebook’s .onion … Read more

Hacking TOR Hidden Services

Hacking TOR Hidden Services What is Tor ? Tor stands for The Onion Route it aims to conceal its users identities and their online activity from various surveillance and traffic analysis algorithms. Tor network uses an implement of .onion routing for sites and web applications hosted on the Tor hidden network. Tor encrypts and randomly … Read more

The LAZY Script – Script to Automate WiFi Penetration & Hacking Tasks

The LAZY script will make your life easier, and of course faster. Credits: arismelachroinos If you like this script follow the project on Github. A video sstec made: https://www.youtube.com/watch?v=gSO7c2MN7TY  I AM NOT RESPONSIBLE HOW YOU USE THIS TOOL.BE LEGAL AND NOT STUPID. Please read the following disclaimer https://hackingvision.com This script will make your life easier, … Read more

Self Destructing Encrypted LUKs Partitions Emergency Nuke Kali Linux

Self Destructing Encrypted LUKs Partitions Emergency Nuke Kali Linux   Welcome back today I will show you to set up a self destructing LUKSs partition in Kali Linux this process is often referred to as an emergency nuke. Due to high demand from users the guys over at Kali.org decided to implement LUKs nuke patch … Read more

Explanation of Rootkits & How To Stay Safe From Rootkits

Explanation of Rootkits & How To Stay Safe From Rootkits In this article I will explain what Rootkits are and how we can stay partially safe from Rootkits. For our new readers when I say partially safe is because no system is ever safe and the manner this type of software is distributed Rootkits can … Read more

Scan Web Servers For Vulnerabilities Using Nikto Kali Linux

Scan Web Servers

Scan Web Servers For Vulnerabilities Using Nikto Kali Linux Scan Web Servers with Nikto Welcome back today we will be talking a little about web vulnerabilities and how we can scan for vulnerabilities in web servers using Nikto. Before attacking a website its vital to do reconnaissance on the target website this helps us gather … Read more

airgeddon – multi-use bash script to audit wireless networks

airgeddon

airgeddon – multi-use bash script to audit wireless networks Credits: v1s1t0rsh3e3 HackingVision Notes: One of the best scripts around for automating various Wireless penetration tasks really well thought out and a regularly updated. We found this script while creating Rouge Access Points but it is not only limited to Rouge AP (Evil-Twin) Attacks it also … Read more

KaliFixer – Bash Script Fix Kali Linux Repositories Update Errors

kali-linux-fix

KaliFixer Description: KaliFixer is a bash script created to help newbies in Kali Linux. We have all been there that dreaded moment when we try to update Kali Linux using apt-get only to be presented with update errors. Don’t worry KaliFixer is on hand !. This script will first find the version of Kali using … Read more

pymultitor – Python Multithreaded Tor Script (Algorithm)

pymultitor

pymultitor – Python Multithreaded Tor Script (Algorithm) pymultitor is a Python script designed to run multiple instances of Tor using multi-threading its main goal is to bypass WAF Firewalls and servers that block IP address during Brute force. Some of these features include. Change IP When Connection Closed With TCP RST. Change IP When String … Read more

Prevent Man-In-The-Middle Attacks, ARP spoofing using shARP

ARP spoofing

Prevent  ARP spoofing using shARP ARP spoofing is a type of MiTM (Man-in-the-middle) attack it may allow an attacker to intercept data frames on a network as well as modify the traffic and stop traffic from communicating with router or gateway. Often the attack is used as opening for other attacks , such as denial … Read more

The Most Dangerous Town on the Internet – Where Cybercrime Goes to Hide (Norton Documentary)

cybercrime

Where Cybercrime Goes to Hide

Norton explores the secretive world of bulletproof hosting also known as uncensored hosting. Bulletproof hosts are no stranger to security they will often place there data centers in isolated areas such as at sea or inside underground nuclear bunkers. Using bulletproof hosting hackers can create a virus, botnets, C&C servers, malware, ransomware, piracy, black market trading and other menacing activities with very little risk this is becuase bulletproof hosts ignore any abuse complains or are often hosted in a country or region where laws can differ.

HavenCo (Sealand)

Bulletproof hosts such as HavenCo in Sealand ,Sealand is its own Sovereign State Located in international waters, on the military fortress of Roughs Tower, Sealand is the smallest country in the world. The country‘s national motto is E Mare, Libertas (From the Sea, Freedom), reflecting its enduring struggle for liberty through the years. Sealand has been an independent sovereign State since 1967 and is subject to its own laws Sealand also has very little to none tax laws.

HavenCo was founded in Sealand and follows Sealand law read the Constitution of the principality of Sealand.

https://en.wikisource.org/wiki/Constitution_of_the_Principality_of_Sealand

CyberBunker

Cyberbunker is a bulletproof host that is hosted in a nuclear bunker deep underground it is impenetrable even against nuclear weapons.

I won’t spoil the following Documentary by little them all out have a watch for yourself and learn about bulletproof hosting.

The Most Dangerous Town on the Internet – Where Cybercrime Goes to Hide (Norton Documentary)

Credits: Norton

If you enjoyed this article please consider sharing it on social media and with your friends thanks for supporting HackingVision.

Subscribe to our news letter by leaving your mail in the form below.

[wysija_form id=”1″]

 

How to Grab a IP Address Using Fake Cloud Hosting Service

fake-cloud-hosting-service

How to Grab IP Address Using Fake Cloud Hosting Service Welcome back today we will be looking in to grabbing IP address’s using a fake cloud hosting service this will act as a honey pot to grab IP address’s of attackers unsuspectingly while they break into your cloud hosting service and try to steal your … Read more