Dr0p1t-Framework – Dropper that bypass most AVs

Dr0p1t-Framework

Dr0p1t-Framework Dr0p1t-Framework A framework that creates a dropper that bypass most AVs, some sandboxes and have some tricks 😉 Credits: D4Vinci – https://github.com/D4Vinci/ Installation & run server On Linux and Windows it’s the same after installing Dr0p1t by doing the steps mentioned above, install modules in server_requirements.txt by using pip like : python -m pip … Read more Dr0p1t-Framework – Dropper that bypass most AVs

Autovpn – Easily connect to a VPN in a country of your choice

auto-vpn

  autovpn Credits: adtac Download autovpn (Leave tool author a star) autovpn is a tool to automatically connect you to a random VPN in a country of your choice. It uses openvpn to connect you to a server obtained from VPN Gate. Compiling First clone the repo and cd into the directory: $ git clone … Read more Autovpn – Easily connect to a VPN in a country of your choice

Autopsy – Digital Forensics Platform

Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera’s memory card. Installers can be found at: http://www.sf.net…http://www.sleuthkit.org/autopsy/ … Read more Autopsy – Digital Forensics Platform

Facebrok – Social Engineering Tool Oriented to facebook

facebrok

ABOUT Download Facebrok Credits: PowerScript facebrok is a social tool for exploiting social network accounts facebook, this platform brings together various Templates explotacion credentials for specific objectives. SF: http://sourceforge.net/projects/facebrok/ http://cave-rt.blogspot.co.uk/2015/06/como-instalar-y-usar-facebrok-project.html REQUIREMENTS PHP MYSQL INSTALLATION Extract the facebrok[Vs{LastVersion}].rar Upload files to server Install. Features tIME lINE |————————————————————->End-Time |-> News Vs 1.9 – 2016-10-12 |-> * New … Read more Facebrok – Social Engineering Tool Oriented to facebook

wifijammer

wifi-jamming

wifijammer Continuously jam all wifi clients and access points within range. The effectiveness of this script is constrained by your wireless card. Alfa cards seem to effectively jam within about a block radius with heavy access point saturation. Granularity is given in the options for more effective targeting. Requires: python 2.7, python-scapy, a wireless card … Read more wifijammer

fb-messenger-cli

terminal

fb-messenger-cli Facebook Messenger Command line client Use your Facebook account to chat with your friends sneakily in the command line, it’s as easy as logging in, choosing a convo and chatting away. Install npm install -g fb-messenger-cli Then fb-messenger-cli from anywhere Choose a friend Chat away Helpful options Features: Real time refreshing on new messages … Read more fb-messenger-cli

PytheM – Multi-purpose pentest framework

pythembkg

PytheM – Penetration Testing Framework v0.6.6 Credits: m4n3dw0lf Download PytheM PytheM is a python multi-purpose pentest framework. It has been developed in the hope that it will be useful and I don’t take responsibility for any misapplication of it. Only runs on GNU/Linux OS. Examples ARP spoofing – Man-in-the-middle pythem> set interface [+] Enter the … Read more PytheM – Multi-purpose pentest framework

Hack Android Mobile Phone using MSFVenom Kali Linux

android-hacked

In this tutorial, you will learn how to Hack any Android mobile phone using MSFVenom. Requirements Linux Based Operating System (In this tutorial we are using Kali Linux 2017.2) Metasploit Framework MSFVenom is a hacking tool that targets the Android operating system. The tool is a combination of MSFEncode & MSFPayload. Ok now let’s get … Read more Hack Android Mobile Phone using MSFVenom Kali Linux

Davscan – A Tool That Fingerprints servers, finds exploits, scans WebDAV

dav-scan

DAVScan Credits: Graph-X [sociallocker id=”968″]Download Davscan[/sociallocker] DAVScan is a quick and lightweight webdav scanner designed to discover hidden files and folders on DAV enabled webservers. The scanner works by taking advantage of overly privileged/misconfigured WebDAV servers or servers vulnerable to various disclosure or authentication bypass vulnerabilities. The scanner attempts to fingerprint the target server and … Read more Davscan – A Tool That Fingerprints servers, finds exploits, scans WebDAV

Java Deserialization Scanner

java-scanner

All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities Download Java-Deserialization-Scanner Credits: federicodotta Java Deserialization Scanner Java Deserialization Scanner is a Burp Suite plugin aimed at detect and exploit Java deserialization vulnerabilities. It was written by Federico Dotta, a Security Expert at @ Mediaservice.net. The plugin is made up … Read more Java Deserialization Scanner

Installing Additional Modules in Metasploit

metasploit

In this guide you will learn how to install additional modules in Metasploit. Metasploit is An open source attack framework first developed by H. D. Moore in 2003. Metasploit is used for hacking into systems for testing purposes. Metasploit provides useful information to people who perform penetration testing, IDS signature development, and exploit research. lets … Read more Installing Additional Modules in Metasploit

Snoopy Tutorial – Finding Previously Connected SSID’S of a Device

wifi1

Wireless Networks can leak a treasure trove of information. In this tutorial we will use Snoopy to find various Wireless Access Points and Access points a device is probing for this can help us determine the name to call our malicious SSID for a evil twin network. When a device is probing for Wireless Access … Read more Snoopy Tutorial – Finding Previously Connected SSID’S of a Device

Smith – Client/Server Style Agent For Testing Network Connectivity

smith

smith Credits: jidir (Leave him a star on Github) Download Smith  A client/server style agent meant for testing connectivity to and from a machine on a network. Installation python setup.py install or pip install . should install smith. Note: If you want to use the tcp/udp protocol options, you’ll need to install scapy and it’s … Read more Smith – Client/Server Style Agent For Testing Network Connectivity

TheFatRat Tutorial – Generate Undetectable Payload FUD, Bypass Anti-Virus, Gain Remote Access

fatrat

In this tutorial I will show you how to use TheFatRat to generate a Undetectable payload (FUD) to gain remote access to a Windows Operating System. What is TheFatRat ?. TheFatRat is a easy tool to generate backdoor’s with msfvenom (a part from metasploit framework) and easy post exploitation attack. This tool compiles a malware … Read more TheFatRat Tutorial – Generate Undetectable Payload FUD, Bypass Anti-Virus, Gain Remote Access

Cracking WPA/WPA2 WPA Key Wireless Access Point Passphrase

hacking-wps-router

In this article we will learn how to brute force a WPS key using Airodump-ng, Reaver with Pixie Dust addon if your running an older version of reaver update before starting this tutorial. WPA/WPA2 (Wi-Fi Protected Setup) is impelled by most manufactures to secure routers & other wireless devices. A Wireless Interface in Modern Terms is … Read more Cracking WPA/WPA2 WPA Key Wireless Access Point Passphrase

How to Install Arch Linux

how-to-install-arch-linux-install

In this Guide I will show you how to Install Arch Linux first of all you will need to go to Arch Linux Official website and download the correct .ISO image for your CPU Architecture you can download these files via HTTP in your web browser or by Torrent using a Torrent Client. In this … Read more How to Install Arch Linux

Social Engineering Credential Harvester Method Phishing in SET

Social Engineering

Social Engineering Credential Harvester Method Phishing in SET Social Engineering Credential Harvester Method Phishing in SET, Harvest credentials using SEToolkit SET Kali Linux tutorial, Credential Harvester Kali Linux. Social Engineering relies heavily on human interaction and deception, trickery you get the picture it is a specialist way of extracting data from somebody or a third … Read more Social Engineering Credential Harvester Method Phishing in SET

Change or Spoof Network Interface Mac Address Using Macchanger

mac-address-spoofing

  Macchanger is a tool that is used for manipulating the mac address of a wireless or wired network interface. Today I will show you show to spoof you mac address. Changing your mac address helps hide the identity of your hardwares network address and helps overcome limitations such as mac address filtering by routers … Read more Change or Spoof Network Interface Mac Address Using Macchanger

Embedding a Metasploit Payload to an original Android Apk.

android

Embed a Metasploit Payload in an original Android Apk. Welcome back in the last part of the Android Hacking Series we discussed how to create a malicious payload to Hack Android Phones. Today you will learn how to make your malicious Android APK more convincing by injecting a hook of our payload into an original … Read more Embedding a Metasploit Payload to an original Android Apk.

Subscribe to our mailing list.

yoast seo premium free