Kali Linux Man in the Middle Attack Arpspoofing/Arppoisoning

man-in-the-middle

Welcome back today we will talk about Man-in-the-middle attacks. In computer security, a man-in-the-middle attack (often abbreviated mitm, or the same using all capital letters) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. In this guide we will be … Read moreKali Linux Man in the Middle Attack Arpspoofing/Arppoisoning

Autovpn – Easily connect to a VPN in a country of your choice

auto-vpn

  autovpn Credits: adtac Download autovpn (Leave tool author a star) autovpn is a tool to automatically connect you to a random VPN in a country of your choice. It uses openvpn to connect you to a server obtained from VPN Gate. Compiling First clone the repo and cd into the directory: $ git clone … Read moreAutovpn – Easily connect to a VPN in a country of your choice

Dr0p1t-Framework – Dropper that bypass most AVs

Dr0p1t-Framework

Dr0p1t-Framework Dr0p1t-Framework A framework that creates a dropper that bypass most AVs, some sandboxes and have some tricks 😉 Credits: D4Vinci – https://github.com/D4Vinci/ Installation & run server On Linux and Windows it’s the same after installing Dr0p1t by doing the steps mentioned above, install modules in server_requirements.txt by using pip like : python -m pip … Read moreDr0p1t-Framework – Dropper that bypass most AVs

wifijammer

wifi-jamming

wifijammer Continuously jam all wifi clients and access points within range. The effectiveness of this script is constrained by your wireless card. Alfa cards seem to effectively jam within about a block radius with heavy access point saturation. Granularity is given in the options for more effective targeting. Requires: python 2.7, python-scapy, a wireless card … Read morewifijammer

Facebrok – Social Engineering Tool Oriented to facebook

facebrok

ABOUT Download Facebrok Credits: PowerScript facebrok is a social tool for exploiting social network accounts facebook, this platform brings together various Templates explotacion credentials for specific objectives. SF: http://sourceforge.net/projects/facebrok/ http://cave-rt.blogspot.co.uk/2015/06/como-instalar-y-usar-facebrok-project.html REQUIREMENTS PHP MYSQL INSTALLATION Extract the facebrok[Vs{LastVersion}].rar Upload files to server Install. Features tIME lINE |————————————————————->End-Time |-> News Vs 1.9 – 2016-10-12 |-> * New … Read moreFacebrok – Social Engineering Tool Oriented to facebook

PytheM – Multi-purpose pentest framework

pythembkg

PytheM – Penetration Testing Framework v0.6.6 Credits: m4n3dw0lf Download PytheM PytheM is a python multi-purpose pentest framework. It has been developed in the hope that it will be useful and I don’t take responsibility for any misapplication of it. Only runs on GNU/Linux OS. Examples ARP spoofing – Man-in-the-middle pythem> set interface [+] Enter the … Read morePytheM – Multi-purpose pentest framework

Hack Android Mobile Phone using MSFVenom Kali Linux

android-hacked

In this tutorial, you will learn how to Hack any Android mobile phone using MSFVenom. Requirements Linux Based Operating System (In this tutorial we are using Kali Linux 2017.2) Metasploit Framework MSFVenom is a hacking tool that targets the Android operating system. The tool is a combination of MSFEncode & MSFPayload. Ok now let’s get … Read moreHack Android Mobile Phone using MSFVenom Kali Linux

Smith – Client/Server Style Agent For Testing Network Connectivity

smith

smith Credits: jidir (Leave him a star on Github) Download Smith  A client/server style agent meant for testing connectivity to and from a machine on a network. Installation python setup.py install or pip install . should install smith. Note: If you want to use the tcp/udp protocol options, you’ll need to install scapy and it’s … Read moreSmith – Client/Server Style Agent For Testing Network Connectivity

Davscan – A Tool That Fingerprints servers, finds exploits, scans WebDAV

dav-scan

DAVScan Credits: Graph-X [sociallocker id=”968″]Download Davscan[/sociallocker] DAVScan is a quick and lightweight webdav scanner designed to discover hidden files and folders on DAV enabled webservers. The scanner works by taking advantage of overly privileged/misconfigured WebDAV servers or servers vulnerable to various disclosure or authentication bypass vulnerabilities. The scanner attempts to fingerprint the target server and … Read moreDavscan – A Tool That Fingerprints servers, finds exploits, scans WebDAV

TheFatRat Tutorial – Generate Undetectable Payload FUD, Bypass Anti-Virus, Gain Remote Access

fatrat

In this tutorial I will show you how to use TheFatRat to generate a Undetectable payload (FUD) to gain remote access to a Windows Operating System. What is TheFatRat ?. TheFatRat is a easy tool to generate backdoor’s with msfvenom (a part from metasploit framework) and easy post exploitation attack. This tool compiles a malware … Read moreTheFatRat Tutorial – Generate Undetectable Payload FUD, Bypass Anti-Virus, Gain Remote Access

Snoopy Tutorial – Finding Previously Connected SSID’S of a Device

wifi1

Wireless Networks can leak a treasure trove of information. In this tutorial we will use Snoopy to find various Wireless Access Points and Access points a device is probing for this can help us determine the name to call our malicious SSID for a evil twin network. When a device is probing for Wireless Access … Read moreSnoopy Tutorial – Finding Previously Connected SSID’S of a Device

Java Deserialization Scanner

java-scanner

All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities Download Java-Deserialization-Scanner Credits: federicodotta Java Deserialization Scanner Java Deserialization Scanner is a Burp Suite plugin aimed at detect and exploit Java deserialization vulnerabilities. It was written by Federico Dotta, a Security Expert at @ Mediaservice.net. The plugin is made up … Read moreJava Deserialization Scanner

Installing Additional Modules in Metasploit

metasploit

In this guide you will learn how to install additional modules in Metasploit. Metasploit is An open source attack framework first developed by H. D. Moore in 2003. Metasploit is used for hacking into systems for testing purposes. Metasploit provides useful information to people who perform penetration testing, IDS signature development, and exploit research. lets … Read moreInstalling Additional Modules in Metasploit

Social Engineering Credential Harvester Method Phishing in SET

Social Engineering

Social Engineering Credential Harvester Method Phishing in SET Social Engineering Credential Harvester Method Phishing in SET, Harvest credentials using SEToolkit SET Kali Linux tutorial, Credential Harvester Kali Linux. Social Engineering relies heavily on human interaction and deception, trickery you get the picture it is a specialist way of extracting data from somebody or a third … Read moreSocial Engineering Credential Harvester Method Phishing in SET

Cracking WPA/WPA2 WPA Key Wireless Access Point Passphrase

hacking-wps-router

In this article we will learn how to brute force a WPS key using Airodump-ng, Reaver with Pixie Dust addon if your running an older version of reaver update before starting this tutorial. WPA/WPA2 (Wi-Fi Protected Setup) is impelled by most manufactures to secure routers & other wireless devices. A Wireless Interface in Modern Terms is … Read moreCracking WPA/WPA2 WPA Key Wireless Access Point Passphrase

Change or Spoof Network Interface Mac Address Using Macchanger

mac-address-spoofing

  Macchanger is a tool that is used for manipulating the mac address of a wireless or wired network interface. Today I will show you show to spoof you mac address. Changing your mac address helps hide the identity of your hardwares network address and helps overcome limitations such as mac address filtering by routers … Read moreChange or Spoof Network Interface Mac Address Using Macchanger

Increasing Wifi TX Power Signal Strength in Linux

wireless-power

Increasing Wifi TX Power Signal Strength in Linux TX power is a setting for the radio to set its transmitting strength. Higher values amplify the signal strength, but also increase power usage. Tx power level 1 is always the highest level of power a wireless access point. The transmit power level is assigned an integer … Read moreIncreasing Wifi TX Power Signal Strength in Linux

Embedding a Metasploit Payload to an original Android Apk.

android

Embed a Metasploit Payload in an original Android Apk. Welcome back in the last part of the Android Hacking Series we discussed how to create a malicious payload to Hack Android Phones. Today you will learn how to make your malicious Android APK more convincing by injecting a hook of our payload into an original … Read moreEmbedding a Metasploit Payload to an original Android Apk.

Takeover.sh – Wipe and reinstall a running Linux system via SSH, without rebooting.

ssh dont tell anyone its free

Wipe and reinstall a running Linux distro via SSH, without rebooting.  Takeover.sh A script to completely take over a running Linux distro (system) remotely, allowing you to log into an in-memory rescue environment, unmount the original root filesystem, and do anything you want, all without rebooting. Replace one distro with another without touching a physical console. … Read moreTakeover.sh – Wipe and reinstall a running Linux system via SSH, without rebooting.

Subscribe to our newsletter!

yoast seo premium free