KnockMail – Verify if email exists

knockmail

KnockMail Verify if email exists Copyright 2017 KnockMail Written by: * Alisson Moretto – 4w4k3 Twitter: @4w4k3Official Cloning: git clone https://github.com/4w4k3/KnockMail.git Running: cd KnockMail sudo su pip install -r requeriments.txt python knock.py If you have another version of Python: python2.7 knock.py Screen DISCLAIMER: “DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE … Read moreKnockMail – Verify if email exists

Umbrella – A Phishing Dropper designed to Pentest

Umbrella Phishing Dropper

Umbrella Dropper Copyright 2017 Umbrella Written by * Alisson Moretto – 4w4k3 Umbrella is a file dropper dedicated to pentest, its download files on the target system execute them without a double execution of exe, only of embed. To compromise the same target again, you need to delete this folder on the target system : … Read moreUmbrella – A Phishing Dropper designed to Pentest

BinGoo! A Linux bash based Bing and Google Dorking Tool

google-dorks-bash

BinGoo! A Linux bash based Bing and Google Dorking Tool Welcome to the BinGoo README file! This should give you a general overview of what the tool is all about and how to go about using it. This is a the result of a project of mine to come up with better solution for gathering … Read moreBinGoo! A Linux bash based Bing and Google Dorking Tool

Windows crypto-ransomware POC

Ransomware

Windows crypto-ransomware POC Credits: mauri870 Note: This project is purely academic, use at your own risk. I do not encourage in any way the use of this software illegally or to attack targets without their previous authorization The intent here is to disseminate and teach more about security in the actual world. Remember, security is … Read moreWindows crypto-ransomware POC

WhatsPwn 2.0 – Extract sensitive data and inject payloads into any Android devices

whatspwn

WhatsPwn 2.0 – Linux Tool to extract sensitive data and inject payloads into any Android devices. Credits: José Luis Rodríguez Fragoso (jlrodriguezf) here is a new version of the linux tool WhatsPwn which features new payload options like meterpreter injection or the ability to create hidden or visible payloads and inject them into any android … Read moreWhatsPwn 2.0 – Extract sensitive data and inject payloads into any Android devices

CloudFail – Utilize misconfigured DNS Find hidden IP’s behind the CloudFlare network

cloudfail

CloudFail Credits: m0rtem CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases. Misconfigured DNS scan using DNSDumpster.com. Scan the … Read moreCloudFail – Utilize misconfigured DNS Find hidden IP’s behind the CloudFlare network

EAPHammer – Targeted Evil Twin Attacks WPA2-Enterprise Networks

eaphammer-2

EAPHammer – Targeted Evil Twin Attacks WPA2-Enterprise Networks EAPHammer is a toolkit designed by Gabriel Ryan (s0lst1c3) for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope wireless assessments and red team engagements. As such, focus is placed on providing an easy-to-use interface that can be leveraged … Read moreEAPHammer – Targeted Evil Twin Attacks WPA2-Enterprise Networks

Makemon – Create Single or Multiple Monitor Mode WiFi Interfaces

Makemon Make a single (or up to 10) monitor mode wireless interfaces with unique mac addresses. Credits: Yo-kai-Sei-shin-kage # makemon by Yokai Seishinkage # Make a single (or up to 10) monitor mode wireless interfaces with unique mac addresses. Dependencies 1.) iw 2.) macchanger Installation Move “makemon” to “/usr/bin/” directory/folder or any directory you choose … Read moreMakemon – Create Single or Multiple Monitor Mode WiFi Interfaces

Hacking TOR Hidden Services

Hacking TOR Hidden Services What is Tor ? Tor stands for The Onion Route it aims to conceal its users identities and their online activity from various surveillance and traffic analysis algorithms. Tor network uses an implement of .onion routing for sites and web applications hosted on the Tor hidden network. Tor encrypts and randomly … Read moreHacking TOR Hidden Services

Self Destructing Encrypted LUKs Partitions Emergency Nuke Kali Linux

Self Destructing Encrypted LUKs Partitions Emergency Nuke Kali Linux   Welcome back today I will show you to set up a self destructing LUKSs partition in Kali Linux this process is often referred to as an emergency nuke. Due to high demand from users the guys over at Kali.org decided to implement LUKs nuke patch … Read moreSelf Destructing Encrypted LUKs Partitions Emergency Nuke Kali Linux

Explanation of Rootkits & How To Stay Safe From Rootkits

Explanation of Rootkits & How To Stay Safe From Rootkits In this article I will explain what Rootkits are and how we can stay partially safe from Rootkits. For our new readers when I say partially safe is because no system is ever safe and the manner this type of software is distributed Rootkits can … Read moreExplanation of Rootkits & How To Stay Safe From Rootkits

Collection of Extra Phishing Scenarios for Wifiphisher

Phishing Scenarios

Collection of Extra Phishing Scenarios for Wifiphisher Wifiphisher is a security tool that mounts automated victim-customized phishing attacks against WiFi clients in order to obtain credentials or infect the victims with malware. It is primarily a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way … Read moreCollection of Extra Phishing Scenarios for Wifiphisher

airgeddon – multi-use bash script to audit wireless networks

airgeddon

airgeddon – multi-use bash script to audit wireless networks Credits: v1s1t0rsh3e3 HackingVision Notes: One of the best scripts around for automating various Wireless penetration tasks really well thought out and a regularly updated. We found this script while creating Rouge Access Points but it is not only limited to Rouge AP (Evil-Twin) Attacks it also … Read moreairgeddon – multi-use bash script to audit wireless networks

KaliFixer – Bash Script Fix Kali Linux Repositories Update Errors

kali-linux-fix

KaliFixer Description: KaliFixer is a bash script created to help newbies in Kali Linux. We have all been there that dreaded moment when we try to update Kali Linux using apt-get only to be presented with update errors. Don’t worry KaliFixer is on hand !. This script will first find the version of Kali using … Read moreKaliFixer – Bash Script Fix Kali Linux Repositories Update Errors

Prevent Man-In-The-Middle Attacks, ARP spoofing using shARP

ARP spoofing

Prevent  ARP spoofing using shARP ARP spoofing is a type of MiTM (Man-in-the-middle) attack it may allow an attacker to intercept data frames on a network as well as modify the traffic and stop traffic from communicating with router or gateway. Often the attack is used as opening for other attacks , such as denial … Read morePrevent Man-In-The-Middle Attacks, ARP spoofing using shARP

How to use Traceroute Command In Linux

Traceroute Command

How to use Traceroute Command In Linux Traceroute Command Linux: Hi, welcome back. Today I will be explaining a little about Traceroute and how we can use Traceroute to diagnose network connectivity problems. By using Traceroute we can also reveal what route packets have taken to reach their destination. Traceroute is a Networking diagnostic utility … Read moreHow to use Traceroute Command In Linux

SEToolkit – Hacking Windows Machines Using USB/CD Infectious Media Generator

memory-stick

SEToolkit – Hacking Windows Machines Infectious Media Generator Requirements Linux based Operating System (In this tutorial we are using Kali Linux) SEToolkit (Comes pre-installed in Kali Linux) What is SEToolkit ? The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration testing around … Read moreSEToolkit – Hacking Windows Machines Using USB/CD Infectious Media Generator

mimikittenz – Powershell Tool for Extracting Juicy info from Memory RAM

mimikittenz

A post-exploitation powershell tool for extracting juicy info from memory. mimikittenz mimikittenz is a post-exploitation powershell tool that utilizes the Windows function ReadProcessMemory() in order to extract plain-text passwords from various target processes. mimikittenz can also easily extract other kinds of juicy info from target processes using regex patterns including but not limited to: TRACK2 … Read moremimikittenz – Powershell Tool for Extracting Juicy info from Memory RAM

How to Use Metasploit, SEToolkit Without Opening Ports Kali Linux

Without Opening Ports

How to Use Metasploit, SEToolkit Without Opening Ports Kali Linux Use hacking tools without opening ports: It can be quite annoying when you have limited access to ports on a network this can cause problems when pentesting as you can only test traffic within the same network. Unless of course you could open the correct … Read moreHow to Use Metasploit, SEToolkit Without Opening Ports Kali Linux

Finding WPS enabled AP’s Kali Linux Wash – HackingVision

wash

Finding WPS enabled AP’s Kali Linux Wash Welcome to HackingVision, Today I will show you how to find out if a nearby router is WPS enabled in Kali Linux using Wash. A lot of modern routers support Wifi Protected Setup (WPS) and it’s quite often enabled by default by the router manufacturer or ISP. First … Read moreFinding WPS enabled AP’s Kali Linux Wash – HackingVision

yoast seo premium free