Loki Remote Access Tool/Botnet (Pure-L0G1C) – HackingVision

Remote Access Tool

Loki Remote Access Tool/Botnet Loki is a Remote Access Tool that uses RSA-2048 with AES-256 to keep your communication secure.     Credits: Pure-L0G1C Loki uses RSA-2048 with AES-256 to keep your communication secure. Warning: DO NOT upload any samples generated by this program to online scanners. Requirements Python 3.6.x | 3.7.x Server tested on … Read moreLoki Remote Access Tool/Botnet (Pure-L0G1C) – HackingVision

50 Best Hacking & Forensics Tools Included in Kali Linux

Best Hacking

50 Best Hacking & Forensics Tools Included in Kali Linux 50 Best Hacking & Forensics Tools Included in Kali Linux: Welcome to HackingVision, in this article we will list the best 50 hacking & forensics tools that are included in Kali Linux. Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains … Read more50 Best Hacking & Forensics Tools Included in Kali Linux

Rogue Toolkit – Extensible toolkit providing easy-to-deploy Access Points

Rogue Toolkit

Rogue Toolkit – Extensible toolkit providing easy-to-deploy Access Points Rouge Toolkit: An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements. The Rogue Toolkit is an extensible toolkit aimed at providing penetration testers an easy-to-use platform to deploy software-defined Access Points (AP) for the purpose … Read moreRogue Toolkit – Extensible toolkit providing easy-to-deploy Access Points

Seeker – Accurately Locate Smartphones using Social Engineering

Locate Smartphones

Seeker – Accurately Locate Smartphones using Social Engineering Locate Smartphones: Seeker comes preinstalled in BlackArch Linux. If you are using Kali Linux, Parrot OS or another Linux based distribution see install information below.   Seeker is developed by thewhiteh4t. Seeker is a Proof of Concept and is for Educational Purposes Only, Seeker shows what data … Read moreSeeker – Accurately Locate Smartphones using Social Engineering

SniffAir – Wireless security framework for wireless pentesting

Wireless Security

SniffAir – Wireless security framework for wireless pentesting SniffAir is an open-source wireless security framework which provides the ability to easily parse passively collected wireless data as well as launch sophisticated wireless attacks. SniffAir takes care of the hassle associated with managing large or multiple pcap files while thoroughly cross-examining and analyzing the traffic, looking … Read moreSniffAir – Wireless security framework for wireless pentesting

PACK (Password Analysis and Cracking Kit) – HackingVision

password

PACK (Password Analysis and Cracking Kit)   Credits: iphelix   Password Analysis and Cracking Kit by Peter Kacherginsky (iphelix) ================================================================== PACK (Password Analysis and Cracking Toolkit) is a collection of utilities developed to aid in analysis of password lists in order to enhance password cracking through pattern detection of masks, rules, character-sets and other password … Read morePACK (Password Analysis and Cracking Kit) – HackingVision

fsociety Hacking Tools Pack – A Penetration Testing Framework

fsocity-hacking

Fsociety Hacking Tools Pack A Penetration Testing Framework, you will have every script that a hacker needs   Fsociety Contains All Tools Used in Mr. Robot Series     Menu Information Gathering Password Attacks Wireless Testing Exploitation Tools Sniffing & Spoofing Web Hacking Private Web Hacking Post Exploitation Contributors Install & Update Information Gathering: Nmap … Read morefsociety Hacking Tools Pack – A Penetration Testing Framework

Scan WordPress websites for vulnerabilities WPScan Kali Linux

wpscan2

Scan WordPress websites for vulnerabilities WPScan Kali Linux   WPScan is a black box vulnerability scanner for WordPress websites. WPScan comes pre-installed in Kali Linux. Kali Linux is a popular Linux distribution built on Debian Kali Linux that comes with many of the best ethical hacking tools pre-installed. If you’re not using Kali Linux and … Read moreScan WordPress websites for vulnerabilities WPScan Kali Linux

DMitry Deepmagic information Gathering Tool Kali Linux

Information Gathering

DMitry Deepmagic information Gathering Tool Kali Linux   DMitry (Deepmagic Information Gathering Tool) is an open-source Linux CLI tool developed by James Greig. Coded in C. DMitry is a powerful information gathering tool that aims to gather as much information about a host that is possible. Features include subdomains search, email addresses, uptime information, system … Read moreDMitry Deepmagic information Gathering Tool Kali Linux

SQLiv – Massive SQL injection scanner

SQL injection scanner

SQLiv – Massive SQL injection scanner SQLiv Massive SQL injection scanner Features multiple domain scanning with SQL injection dork by Bing, Google, or Yahoo targetted scanning by providing specific domain (with crawling) reverse domain scanning both SQLi scanning and domain info checking are done in multiprocessing so the script is super fast at scanning many … Read moreSQLiv – Massive SQL injection scanner

Best Tools Termux Part 2 Terminal emulator Linux environment for Android

Tools Termux

Best Tools Termux Part 2 Terminal emulator Linux environment for Android Welcome back to HackingVision, in part one Tools for Termux part one Terminal emulator Linux environment for Android we discussed the best hacking tools you can use on Termux terminal emulator. There is a few tools we forgot to mention so we have decided … Read moreBest Tools Termux Part 2 Terminal emulator Linux environment for Android

Script Kiddie Arsenal Hacking Tools Pentesting Scripts

Script Kiddie Arsenal

Script Kiddie Arsenal Hacking Tools Pentesting Scripts Script kiddie arsenal is a list off tools and scripts used by pen testers   1 : Fsociety Fsociety is a all in one script to make pentesting easier. Fsociety is coded in Python. Perfect for beginners to advanced pentesters. Download here: https://github.com/Manisso/fsociety   2 : ScoialFish SocialFish … Read moreScript Kiddie Arsenal Hacking Tools Pentesting Scripts

Cloning websites to use with Beef-XSS – HackingVision

Beef-XSS

Cloning websites to use with Beef-XSS Welcome to HackingVision, Last time we talked about adding your own html templates to Beef-XSS. Today we will learn how to clone a website to use with Beef-XSS.   In this tutorial we are using an Operating System called Kali Linux if you don’t already have Kali Linux you … Read moreCloning websites to use with Beef-XSS – HackingVision

Cracking Wireless Router Using Aircrack-ng with crunch

Cracking Wireless Router Using Aircrack-ng with crunch Welcome to HackingVision, today I will show you how to crack a wireless WPA/WPA2 router using Aircrack-ng and crunch. First off this is tested on my own home network. I don’t advise hacking anyone else’s WiFi but your own. First, we need to put our wireless adaptor into … Read moreCracking Wireless Router Using Aircrack-ng with crunch

BackdoorMan – Toolkit that helps you find malicious PHP scripts and shells

computer

BackdoorMan BackdoorMan is a toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination. Description A Python open source toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination, it automates the process of detecting the above. Purpose The main purpose … Read moreBackdoorMan – Toolkit that helps you find malicious PHP scripts and shells

Collection of metasploit auxiliary post-modules

metasploit

msf-auxiliarys Collection of metasploit auxiliary post-modules written by pedro ubuntu (r00t-3xp10it) Description this working directory contains diferent metasploit auxiliary modules writen by pedro ubuntu (r00t-3xp10it) me to be of assistence in post-exploitation common tasks. Download/Install 1º – Download module from github git clone https://github.com/r00t-3xp10it/msf-auxiliarys.git 2º – edit module to read the description 3º – port module to metasploit … Read moreCollection of metasploit auxiliary post-modules

bettercap-ng – complete reimplementation of bettercap

bettercap-ng

bettercap-ng is a complete reimplementation of bettercap, the Swiss army knife for network attacks and monitoring. It is faster, stabler, smaller, easier to install and to use. Using it with Docker In this repository, BetterCAP is containerized using Alpine Linux – a security-oriented, lightweight Linux distribution based on musl libc and busybox. The resulting Docker … Read morebettercap-ng – complete reimplementation of bettercap

Microsploit (Office Exploitation Tool)

microsploit

a Simple tool and not very special but this tool fast and easy create backdoor office exploitation using module metasploit packet. Like Microsoft Office in windows or mac , Open Office in linux , Macro attack , Buffer Overflow in word . Work in kali rolling , Parrot , Backbox . Install Microsploit git clone … Read moreMicrosploit (Office Exploitation Tool)

Subscribe to our newsletter!

yoast seo premium free