Arachni – Web Application Security Scanner Framework

arachni

Synopsis Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications. It is smart, it trains itself by monitoring and learning from the web application’s behavior during the scan process and is able to perform meta-analysis using a number of factors in order to … Read more Arachni – Web Application Security Scanner Framework

BrowserGather – Fileless web browser information extraction

browser

BrowserGather Fileless Extraction of Sensitive Browser Information with PowerShell This project will include various cmdlets for extracting credential, history, and cookie/session data from the top 3 most popular web browsers (Chrome, Firefox, and IE). The goal is to perform this extraction entirely in-memory, without touching the disk of the victim. Currently Chrome credential and cookie … Read more BrowserGather – Fileless web browser information extraction

KICKthemOUT3 – KICK devices off your NETW0RK

kickthemout

K1CK devices off your N3TW0RK by performing an ARP Spoof attack with Python3+ compatability A tool to kick devices out of your network and enjoy all the bandwidth for yourself. It allows you to select specific or all devices and ARP spoofs them off your local area network. It works mainly in Python3  This is … Read more KICKthemOUT3 – KICK devices off your NETW0RK

Androguard – Python tool to play with Android files

androguard

Androguard Features Androguard is a full python tool to play with Android files. DEX, ODEX APK Android’s binary xml Android resources Disassemble DEX/ODEX bytecodes Decompiler for DEX/ODEX files 1. Authors: Androguard Team Androguard + tools: Anthony Desnos (desnos at t0t0.fr). DAD (DAD is A Decompiler): Geoffroy Gueguen (geoffroy dot gueguen at gmail dot com) 2. … Read more Androguard – Python tool to play with Android files

BeeLogger – Generate Gmail Emailing Keyloggers to Windows

beelogger

BeeLogger Generate Gmail Emailing Keyloggers to Windows. Copyright 2017 BeeLogger Written by: * Alisson Moretto – 4w4k3 Twitter: @4w4k3Official TOOL DESIGNED TO GOOD PURPOSES, PENTESTS, DON’T BE A CRIMINAL ! Only download it here, do not trust in other places. NOTE: BeeLogger just have official support for latin languages in this moment. HOW TO INSTALL: … Read more BeeLogger – Generate Gmail Emailing Keyloggers to Windows

Umbrella – A Phishing Dropper designed to Pentest

umbrella-dropper

Umbrella Dropper Copyright 2017 Umbrella Written by: * Alisson Moretto – 4w4k3 Umbrella is a file dropper dedicated to pentest, its download files on target system are execute them without a double execution of exe, only of embed. To compromise the same target again, you need delete this folder on target system : – C:\Users\Public\Libraries\Intel … Read more Umbrella – A Phishing Dropper designed to Pentest

WiFi Frequency Hacker – Regulatory Domain Configuration That Doesn’t Limit You

wifi

wifi-frequency-hacker A modified frequency regulatory domain configuration that doesn’t limit you. Overview Different countries enforce different frequency restrictions on the various wifi channels. This can be a pain if your card/OS is forcing you into a different configuration than the one you need. There are numerous reasons why this may be happening. From drivers favouring … Read more WiFi Frequency Hacker – Regulatory Domain Configuration That Doesn’t Limit You

WordSteal – Steal NTML Hashes From Remote Computer

WordSteal

WordSteal – Steal NTML Hashes From Remote Computer WordSteal This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes. The author does not keep responsibility for any illegal action you do. WordSteal This script will create a POC that will steal NTML hashes … Read more WordSteal – Steal NTML Hashes From Remote Computer

SSL Kill – Forced Man-In-The-Middle HTTPs-Avoiding Transparent Proxy

sslkill

SSL Kill – Forced Man-In-The-Middle HTTPs-Avoiding Transparent Proxy SSL Kill is a forced man-in-the-middle transparent proxy that modifies HTTP requests and responses in order to avoid SSL and HSTS, to achieve that, it use a two-way ARP spoofing plus a forced DNS resolver that redirects all name server queries to the attacker IP Address. This … Read more SSL Kill – Forced Man-In-The-Middle HTTPs-Avoiding Transparent Proxy

GonnaCry – Linux Ransomware That Encrypts All User Files

linux-pad-lock

Read our disclaimer before you continue. This tool is only provided as a convince any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors of hackingvision.com will … Read more GonnaCry – Linux Ransomware That Encrypts All User Files

Windows crypto-ransomware POC

Ransomware

Windows crypto-ransomware POC Credits: mauri870 Note: This project is purely academic, use at your own risk. I do not encourage in any way the use of this software illegally or to attack targets without their previous authorization The intent here is to disseminate and teach more about security in the actual world. Remember, security is … Read more Windows crypto-ransomware POC

WhatsPwn 2.0 – Extract sensitive data and inject payloads into any Android devices

whatspwn

WhatsPwn 2.0 – Linux Tool to extract sensitive data and inject payloads into any Android devices. Credits: José Luis Rodríguez Fragoso (jlrodriguezf) here is a new version of the linux tool WhatsPwn which features new payload options like meterpreter injection or the ability to create hidden or visible payloads and inject them into any android … Read more WhatsPwn 2.0 – Extract sensitive data and inject payloads into any Android devices

Simple Keylogger – A simple keylogger for Windows, Linux and Mac

Simple Keylogger – A simple keylogger for Windows, Linux and Mac Credits: GiacomoLaw Welcome to the simple keylogger repo! A keylogger is a program that records your keystrokes, and this program saves them in a log file on your local computer. Check out below to learn how to install them. These keyloggers are simple and … Read more Simple Keylogger – A simple keylogger for Windows, Linux and Mac

CloudFail – Utilize misconfigured DNS Find hidden IP’s behind the CloudFlare network

cloudfail

CloudFail Credits: m0rtem CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases. Misconfigured DNS scan using DNSDumpster.com. Scan the … Read more CloudFail – Utilize misconfigured DNS Find hidden IP’s behind the CloudFlare network

Hacking Android Smart Phone Using AhMyth Android RAT

android-backdoor

Welcome back, Today I will show you how to hack an Android smart phone to gain remote access. In this tutorial we will be working with a tool called AhMyth an open source remote access tool AhMyth has many features you would expect to see in a RAT such as Geo location monitoring, SMS modules, … Read more Hacking Android Smart Phone Using AhMyth Android RAT

EAPHammer – Targeted Evil Twin Attacks WPA2-Enterprise Networks

eaphammer-2

EAPHammer – Targeted Evil Twin Attacks WPA2-Enterprise Networks EAPHammer is a toolkit designed by Gabriel Ryan (s0lst1c3) for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope wireless assessments and red team engagements. As such, focus is placed on providing an easy-to-use interface that can be leveraged … Read more EAPHammer – Targeted Evil Twin Attacks WPA2-Enterprise Networks

The LAZY Script – Script to Automate WiFi Penetration & Hacking Tasks

The LAZY script will make your life easier, and of course faster. Credits: arismelachroinos If you like this script follow the project on Github. A video sstec made: https://www.youtube.com/watch?v=gSO7c2MN7TY  I AM NOT RESPONSIBLE HOW YOU USE THIS TOOL.BE LEGAL AND NOT STUPID. Please read the following disclaimer https://hackingvision.com This script will make your life easier, … Read more The LAZY Script – Script to Automate WiFi Penetration & Hacking Tasks

Collection of Extra Phishing Scenarios for Wifiphisher

Phishing Scenarios

Collection of Extra Phishing Scenarios for Wifiphisher Wifiphisher is a security tool that mounts automated victim-customized phishing attacks against WiFi clients in order to obtain credentials or infect the victims with malware. It is primarily a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way … Read more Collection of Extra Phishing Scenarios for Wifiphisher

airgeddon – multi-use bash script to audit wireless networks

airgeddon

airgeddon – multi-use bash script to audit wireless networks Credits: v1s1t0rsh3e3 HackingVision Notes: One of the best scripts around for automating various Wireless penetration tasks really well thought out and a regularly updated. We found this script while creating Rouge Access Points but it is not only limited to Rouge AP (Evil-Twin) Attacks it also … Read more airgeddon – multi-use bash script to audit wireless networks

pymultitor – Python Multithreaded Tor Script (Algorithm)

pymultitor

pymultitor – Python Multithreaded Tor Script (Algorithm) pymultitor is a Python script designed to run multiple instances of Tor using multi-threading its main goal is to bypass WAF Firewalls and servers that block IP address during Brute force. Some of these features include. Change IP When Connection Closed With TCP RST. Change IP When String … Read more pymultitor – Python Multithreaded Tor Script (Algorithm)

Subscribe to our newsletter!

yoast seo premium free