New FinFisher Campaigns Are Scary. Read why

FinFisher an infamous spyware which was widely sold to the government organizations and other agencies. Security researchers at ESET discovered malware/surveillance campaigns utilizing variants of FinFisher in the wild. “New surveillance campaigns utilizing FinFisher, are in the wild, featuring technical improvements, some of these variants have been using a cunning, previously-unseen infection vector with strong indicators … Read more

Kali Linux Hacking eBooks Download in PDF 2019

kali linux hacking

Kali Linux Hacking List of Free Kali Linux Hacking eBooks Download In PDF 2019 Ethical Hacking, Hacking ebooks pdf, Hacking ebooks free download, hacking ebooks collection, Best Hacking eBooks. List curated by Hackingvision.com Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to … Read more

blueborne-scanner – Bluetooth scanner for blueborne-vulnerable devices

bluetooth

Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit VPN Gate auto-grabber Greetz shouts to sh3llg0d, an0n_l1t3, daemochi, akatz!!!! Overview Bluetooth scanner for blueborne-vulnerable devices, Android only for the moment Quickstart git clone https://github.com/hook-s3c/blueborne-scanner.git cd blueborne-scanner sudo chmod +x ./bluebornescan.py pip install -r ./requirements.txt ./bluebornescan.py Breakdown Scans for local bluetooth devices Looks … Read more

WPSetup Attack Targets Fresh Installations of WordPress

wordpress-installation

Website developers can often leave unfinished installations of WordPress on their servers. This can make it very easy for attackers to gain control over new installations of WordPress. Attackers can not only take over the WordPress website but also the entire hosting cluster that is associated with it. This is known as WPSetup Attack. The … Read more

KeyGrabber – Hardware Keylogger – WiFi USB hardware keyloggers

keygrabber-usb

KeyGrabber – Hardware Keylogger – WiFi USB hardware keyloggers KeyGrabber products are hardware keyloggers. KeyGrabber keystroke recorder has up to 2GB of memory, stored on a FAT file system. The device is completely transparent from computer operation such as anti-virus and security software, there are no software or drivers are required. KeyGrabber supports International keyboard … Read more

Free Cyber Security & Hacking eBooks

libary

A curated list of free Security and Pentesting related E-Books available on the Internet. If you want to contribute to this list (please do), send a pull request. All contributors will be recognized and appreciated. The topics include: Android & iOS Cloud Security Defensive Security IoT Malware Analysis & Forensics Network Pentesting Offensive Security Programming … Read more

Droid Hunter – Android application vulnerability analysis pentest tool

droid-hunter-1

Droid Hunter – Android application vulnerability analysis pentest tool Droid Hunter Android application vulnerability analysis and Android pentest tool .—. .———– / \ __ / —— / / \( )/ —– ╔╦╗╦═╗╔═╗╦╔╦╗ ╦ ╦╦ ╦╔╗╔╔╦╗╔═╗╦═╗ ////// ‘ \/ ` — ║║╠╦╝║ ║║ ║║───╠═╣║ ║║║║ ║ ║╣ ╠╦╝ //// / // : : — ═╩╝╩╚═╚═╝╩═╩╝ ╩ … Read more

Windows Exploit Suggester – This tool compares a targets patch levels

Windows Exploit

Windows Exploit Suggester – This tool compares a targets patch levels DESCRIPTION Windows Exploit Suggester This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins. … Read more

Python – All Algorithms implemented in Python

algorithm

The Algorithms – Python All algorithms implemented in Python (for education) These are for demonstration purposes only. There are many implementations of sorts in the Python standard library that are much better for performance reasons. Sort Algorithms Bubble From Wikipedia: Bubble sort, sometimes referred to as sinking sort, is a simple sorting algorithm that repeatedly … Read more

Micetrap – Catch evil hackers on the fly by placing open-port traps

mousetrap

#micetrap ___ .-| | |_/,| (\ { | | |o o |__ _) ) “-.|___| _.( T ) / .–‘–. _((_^–‘ /< .+|_|.-||)`-‘(((/ (((/Catch hackers on the fly with micetrap! Micetrap opens a server on either a given or random port, emulating fake vulnerable services. Port scanners such as Nmap, when fingerprinting ports to discover … Read more

Phishing Frenzy – Ruby on Rails Phishing Framework

phishing-frenzy

Ruby on Rails Phishing Framework Documentation & Info Relevant up to date documentation can be found on the official Phishing Frenzy website located below Phishing Frenzy Website Please submit any tickets or issues to the github issues page Phishing Frenzy Tickets To contact us directly plese use the official Phishing Frenzy website Phishing Frenzy Website … Read more

Gophish – Open-Source Phishing Toolkit

do-not-feed-the-phish

Gophish: Open-Source Phishing Toolkit Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness training. Current Status Update 2/19/2017 Gophish version 0.2.1 binaries will be released soon! I am just fixing a few final bugs and then … Read more

plc – ns-3 module for simulations of power line communication networks

power-lines

An ns-3 module for simulations of power line communication networks plc An ns-3 module for simulations of power line communication networks This software is freely useable provided that publications resulting from the use of this software cite the publications listed here. Cite: F. Aalamifar, A. Schloegl, D. Harris, L. Lampe,“Modelling Power Line Communication Using Network … Read more

Maybe – See what a program does before deciding whether you really want it to happen

maybe

  See what a program does before deciding whether you really want it to happen. rm -rf pic* Are you sure? Are you one hundred percent sure? maybe… … allows you to run a command and see what it does to your files without actually doing it! After reviewing the operations listed, you can then … Read more

SeeCLRly – Fileless SQL Server CLR-based Custom Command Execution

seeclrly

Fileless SQL Server CLR-based Custom Stored Procedure Command Execution For more info about the techinque, please visit sekirkity.com This techinque will allow for the execution of commands on a comprompised Microsoft SQL Server in a novel, fileless manner. The PowerShell module consists of two cmdlets: New-CLRProcedure – This cmdlet enables CLR stored procedures on the … Read more

PyLoggy – Simple and powerful Python keylogger

letters

PyLoggy is simple and powerful Python keylogger that is able to log keystrokes, log mouse clicks, take screenshots and more! The tool will send the logs to your email every minute(you can change this). Installation Clone it: git clone https://github.com/D4Vinci/PyLoggy.git Run it: python PyLoggy.py You can also convert PyLoggy to EXE using PyInstaller or any … Read more

King Phisher – Phishing Campaign Toolkit

king-phisher

Phishing Campaign Toolkit Installation For instructions on how to install, please see the INSTALL.md file. After installing, for instructions on how to get started please see the wiki. Overview King Phisher is a tool for testing and promoting user awareness by simulating real world phishing attacks. It features an easy to use, yet very flexible … Read more

Universal Radio Hacker: investigate wireless protocols like a boss

urh

The Universal Radio Hacker is a software for investigating unknown wireless protocols. Features include hardware interfaces for common Software Defined Radios easy demodulation of signals assigning participants to keep overview of your data customizable decodings to crack even sophisticated encodings like CC1101 data whitening assign labels to reveal the logic of the protocol fuzzing component … Read more

SQLi Google Dork Repository – Dorks Hacking Database

google

SQLi Dork Repository – Dorks Hacking Database for educational proposal WordPress Themes [php]/wp-content/themes/yamidoo/scripts/timthumb.php "/themes/yamidoo" /wp-content/themes/zenko/scripts/timthumb.php "/themes/zenko" /wp-content/themes/listings/timthumb.php "/themes/listings" /wp-content/themes/telegraph/scripts/timthumb.php "/themes/telegraph" /wp-content/themes/freshine/includes/timthumb.php "/themes/freshine" /wp-content/themes/Galleria/timthumb.php "/themes/Galleria" /wp-content/themes/corporattica/scripts/timthumb.php "/themes/corporattica" /wp-content/themes/daily/timthumb.php "/themes/daily" /wp-content/themes/mainstream/thumb.php "/themes/mainstream" /wp-content/themes/wootube/thumb.php "/themes/wootube" /wp-content/themes/groovyvideo/thumb.php "/themes/groovyvideo" /wp-content/themes/wp-elegance_basic/scripts/timthumb.php "/themes/wp-elegance_basic/" /wp-content/themes/ePhoto/timthumb.php "/themes/ePhoto" /wp-content/themes/eNews/timthumb.php "/themes/eNews" /wp-content/themes/eBusiness/timthumb.php "/themes/eBusiness" /wp-content/themes/eGallery/timthumb.php "/themes/eGallery" /wp-content/themes/cleancut/framework/includes/timthumb.php "/themes/cleancut/" /wp-content/themes/WhosWho/timthumb.php "/themes/WhosWho" /wp-content/themes/TheSource/timthumb.php "/themes/TheSource" /wp-content/themes/TheProfessional/timthumb.php "/themes/TheProfessional" /wp-content/themes/TheCorporation/timthumb.php "/themes/TheCorporation" /wp-content/themes/StudioBlue/timthumb.php … Read more