Scan WordPress websites for vulnerabilities WPScan Kali Linux

wpscan2

Scan WordPress websites for vulnerabilities WPScan Kali Linux   WPScan is a black box vulnerability scanner for WordPress websites. WPScan comes pre-installed in Kali Linux. Kali Linux is a popular Linux distribution built on Debian Kali Linux that comes with many of the best ethical hacking tools pre-installed. If you’re not using Kali Linux and … Read moreScan WordPress websites for vulnerabilities WPScan Kali Linux

DMitry Deepmagic information Gathering Tool Kali Linux

Information Gathering

DMitry Deepmagic information Gathering Tool Kali Linux   DMitry (Deepmagic Information Gathering Tool) is an open-source Linux CLI tool developed by James Greig. Coded in C. DMitry is a powerful information gathering tool that aims to gather as much information about a host that is possible. Features include subdomains search, email addresses, uptime information, system … Read moreDMitry Deepmagic information Gathering Tool Kali Linux

Kali Linux Micro Hacking Station Raspberry Pi

Micro Hacking Station

Kali Linux Micro Hacking Station Raspberry Pi   Raspberry Pi is a small pocket-sized low-cost computer. Today we will be setting up Kali Linux on Raspberry Pi. We can use Kali Linux on Raspberry Pi to hack WiFi passwords, launch various social engineering attacks, Set up rogue access points and a wide range of other … Read moreKali Linux Micro Hacking Station Raspberry Pi

Create Metasploit Payload in Kali Linux MSFvenom Payload Creator

Kali Linux

MSFvenom Payload Creator (MSFPC v1.4.5)   MSFvenom Payload Creator (MSFPC) is a wrapper to generate multiple types of payloads, based on the user’s choice. The idea is to be as simple as possible (only requiring one input) to produce their payload. In this tutorial, you will learn how to create MSFvenom payloads using MSF Payload … Read moreCreate Metasploit Payload in Kali Linux MSFvenom Payload Creator

Hacking with PHP payloads and ngrok – HackingVision

PHP Payloads

Hacking with PHP payloads and ngrok – HackingVision Welcome back to HackingVision. Today we will be hacking with PHP payloads,  in this tutorial we will be using msfvenom. Msfvenom comes included with Kali Linux operating system if you don’t already have Kali Linux installed you can download here.   Step 1: Installing ngrok Please follow … Read moreHacking with PHP payloads and ngrok – HackingVision

Msfvenom with ngrok Kali Linux Tutorial – HackingVision

msfvenom

How to use Msfvenom with ngrok Kali Linux Tutorial – HackingVision Hi, welcome to Hacking Vision. Today lets get a little more advanced in our exploits were going to hack a computer running on Windows operating system with msfvenom using reverse HTTP payload.   Step 1: ngrok Let start sign up to ngrok and get … Read moreMsfvenom with ngrok Kali Linux Tutorial – HackingVision

Captain-Brute

Captain brute is a all in one hacking tool by John Modica CybernetiX-S3C it writing in bash with wide range of tools  like phishing attacks ddos information gathering  and much more  To download open terminal and type git clone https://github.com/Hackingvisionofficial/Captain-Brute.git     or git clone https://github.com/CybernetiX-S3C/Captain-Brute cd Captain-Brute chmod 755 captain-brute ./captain-brute from there its straight forward pick … Read moreCaptain-Brute

Cloning websites to use with Beef-XSS – HackingVision

Beef-XSS

Cloning websites to use with Beef-XSS Welcome to HackingVision, Last time we talked about adding your own html templates to Beef-XSS. Today we will learn how to clone a website to use with Beef-XSS.   In this tutorial we are using an Operating System called Kali Linux if you don’t already have Kali Linux you … Read moreCloning websites to use with Beef-XSS – HackingVision

Beef framework adding custom pages – HackingVision

Beef framework

Beef framework adding custom pages Welcome to HackingVision, Today we will learn how to add custom pages to Beef framework. We assume you already know the basics of HTML programming. Step 1: Start Beef-XSS Framework Let us start by opening Beef-XSS framework, Open a new command terminal enter command Beef-XSS.   beef-xss     Step … Read moreBeef framework adding custom pages – HackingVision

Android hacking with sploitgen with no port forwarding

hi guys today im showing you how to hack a android using a tool we made sploitgen  git clone https://github.com/Hackingvisionofficial/splotgen.git cd sploitgen chmod +x sploitgen.sh service apache2 start  service postgresql start ./sploitgen.sh press 1 and enter  now press 4  name the payload what every you want as I’m using Facebook for this tutorial   now we … Read moreAndroid hacking with sploitgen with no port forwarding

Cracking Wireless Router Using Aircrack-ng with crunch

Cracking Wireless Router Using Aircrack-ng with crunch Welcome to HackingVision, today I will show you how to crack a wireless WPA/WPA2 router using Aircrack-ng and crunch. First off this is tested on my own home network. I don’t advise hacking anyone else’s WiFi but your own. First, we need to put our wireless adaptor into … Read moreCracking Wireless Router Using Aircrack-ng with crunch

How to increase volume above 100% in Linux

volume

How to increase volume above 100% in Linux Welcome back today I will show you how to increase volume settings above 100% in Linux. Warning only exceed volumes your speakers can handle. In a Linux based operating system open a new command terminal & enter command. apt-get install pulseaudio Next we need to install pavucontrol … Read moreHow to increase volume above 100% in Linux

APs_Beacon – With this script you can spam WiFi APs/Hotspots

aps_becon

With this script you can spam WiFi APs. How to run it? Download “APs_Beacon.sh” and “SSID_List.txt” or type “git clone https://github.com/BlueArduino20/APs_Beacon“ You need to give execution permissions by typing: “chmod +x APs_Beacon.sh” You open the script: “./APs_Beacon.sh” That’s all. [php]git clone https://github.com/BlueArduino20/APs_Beacon cd APs_Beacon chmod +x APs_Beacon.sh ./APs_Beacon.sh[/php] CREDITS: BlueArduino20 DOWNLOAD APs_Beacon We recommend usage … Read moreAPs_Beacon – With this script you can spam WiFi APs/Hotspots

Windows crypto-ransomware POC

Ransomware

Windows crypto-ransomware POC Credits: mauri870 Note: This project is purely academic, use at your own risk. I do not encourage in any way the use of this software illegally or to attack targets without their previous authorization The intent here is to disseminate and teach more about security in the actual world. Remember, security is … Read moreWindows crypto-ransomware POC

WhatsPwn 2.0 – Extract sensitive data and inject payloads into any Android devices

whatspwn

WhatsPwn 2.0 – Linux Tool to extract sensitive data and inject payloads into any Android devices. Credits: José Luis Rodríguez Fragoso (jlrodriguezf) here is a new version of the linux tool WhatsPwn which features new payload options like meterpreter injection or the ability to create hidden or visible payloads and inject them into any android … Read moreWhatsPwn 2.0 – Extract sensitive data and inject payloads into any Android devices

Hacking Android Smart Phone Using AhMyth Android RAT

android-backdoor

Welcome back, Today I will show you how to hack an Android smart phone to gain remote access. In this tutorial we will be working with a tool called AhMyth an open source remote access tool AhMyth has many features you would expect to see in a RAT such as Geo location monitoring, SMS modules, … Read moreHacking Android Smart Phone Using AhMyth Android RAT

Hacking TOR Hidden Services

Hacking TOR Hidden Services What is Tor ? Tor stands for The Onion Route it aims to conceal its users identities and their online activity from various surveillance and traffic analysis algorithms. Tor network uses an implement of .onion routing for sites and web applications hosted on the Tor hidden network. Tor encrypts and randomly … Read moreHacking TOR Hidden Services

Scan Web Servers For Vulnerabilities Using Nikto Kali Linux

Scan Web Servers

Scan Web Servers For Vulnerabilities Using Nikto Kali Linux Scan Web Servers with Nikto Welcome back today we will be talking a little about web vulnerabilities and how we can scan for vulnerabilities in web servers using Nikto. Before attacking a website its vital to do reconnaissance on the target website this helps us gather … Read moreScan Web Servers For Vulnerabilities Using Nikto Kali Linux

Social Engineering Credential Harvester Method Phishing in SET

Social Engineering

Social Engineering Credential Harvester Method Phishing in SET Social Engineering Credential Harvester Method Phishing in SET, Harvest credentials using SEToolkit SET Kali Linux tutorial, Credential Harvester Kali Linux. Social Engineering relies heavily on human interaction and deception, trickery you get the picture it is a specialist way of extracting data from somebody or a third … Read moreSocial Engineering Credential Harvester Method Phishing in SET

Subscribe to our newsletter!

yoast seo premium free