Best Tools Termux Part 2 Terminal emulator Linux environment for Android

Tools Termux

Best Tools Termux Part 2 Terminal emulator Linux environment for Android Welcome back to HackingVision, in part one Tools for Termux part one Terminal emulator Linux environment for Android we discussed the best hacking tools you can use on Termux terminal emulator. There is a few tools we forgot to mention so we have decided … Read more

Tools for Termux part one Terminal emulator Linux environment for Android

Terminal emulator

Tools for Termux Terminal emulator part one There’s a lot hype about Termux Terminal emulator in the hacking world so i though was only fair to add a post on the top tools to install on termux. What is termux Termux turns a Android device into a lightweight and versatile Linux environment. The app requires … Read more

How Thieves Can Target High End Devices Using Wifi Signals

Wifi Signals

How Thieves Can Target High-End Devices Using Wifi Signals Your wireless devices could be leaking information about them selfs to hackers and criminals or anyone with a smartphone. Wifi signals Disclaimer HackingVision does not condone the illegal use of this software nor does it promote the illegal use of this software mentioned in this article. … Read more

Cloning websites to use with Beef-XSS – HackingVision

Beef-XSS

Cloning websites to use with Beef-XSS Welcome to HackingVision, Last time we talked about adding your own html templates to Beef-XSS. Today we will learn how to clone a website to use with Beef-XSS.   In this tutorial we are using an Operating System called Kali Linux if you don’t already have Kali Linux you … Read more

Beef framework adding custom pages – HackingVision

Beef framework

Beef framework adding custom pages Welcome to HackingVision, Today we will learn how to add custom pages to Beef framework. We assume you already know the basics of HTML programming. Step 1: Start Beef-XSS Framework Let us start by opening Beef-XSS framework, Open a new command terminal enter command Beef-XSS.   beef-xss     Step … Read more

Hacking Exposed Computer Forensics,2nd edition

Hacking Exposed

Hacking Exposed Computer Forensics,2nd edition PDF eBook Hacking Exposed Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. … Read more

Cracking Wireless Router Using Aircrack-ng with crunch

Cracking Wireless Router Using Aircrack-ng with crunch Welcome to HackingVision, today I will show you how to crack a wireless WPA/WPA2 router using Aircrack-ng and crunch. First off this is tested on my own home network. I don’t advise hacking anyone else’s WiFi but your own. First, we need to put our wireless adaptor into … Read more

WATCH: Phone Hackers – Britain’s Secret Surveillance (Vice)

Phone Hackers

Phone Hackers: Britain’s Secret Surveillance

Phone Hackers: Britain’s Secret Surveillance in this video, Vice Media uncovers one of Britain’s secret surveillance devices the IMSI catcher. International Mobile Subscriber Identity-catcher, IMSI Catcher/stingray are portable devices used to hack mobile phone communications, within a set area by claiming to be a cell phone tower. IMSI Catchers allow law enforcement and government agencies to hack mobile phone communications with very little ease. In the UK (United Kingdom) we don’t know who are using IMSI catchers nor do we know their intentions. IMSI Catchers could be used by Law enforcement, Government agencies, Criminals, Political parties and Security experts. It’s hard to detect IMSI catchers as there disguised as mobile phone towers.

BackdoorMan – Toolkit that helps you find malicious PHP scripts and shells

computer

BackdoorMan BackdoorMan is a toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination. Description A Python open source toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination, it automates the process of detecting the above. Purpose The main purpose … Read more

Top 100 Free Hacking Books PDF Collection – HackingVision

hacking books pdf

List of Free Hacking books PDF. Ethical Hacking, Hacking books pdf, Hacking ebooks free download, hacking ebooks collection, Best Hacking eBooks. This list for everyone who is interested in ethical hacking, beginners or professionals both. These top 100 hacking books pdf list is created based on the public reviews given for the books. List curated … Read more

bettercap-ng – complete reimplementation of bettercap

bettercap-ng

bettercap-ng is a complete reimplementation of bettercap, the Swiss army knife for network attacks and monitoring. It is faster, stabler, smaller, easier to install and to use. Using it with Docker In this repository, BetterCAP is containerized using Alpine Linux – a security-oriented, lightweight Linux distribution based on musl libc and busybox. The resulting Docker … Read more

Brute Force Patator – Multi-purpose brute-forcer modular design

brute-force

Brute-Force Patator – Multi-purpose brute-forcer modular design Brute-Force Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage. Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create yet another … Read more

CeWL: Custom Wordlist Generator Taking URL as Parameter

Cewl wordlist generator is different from other wordlist generators as it takes the website URL as a parameter. It does so by crawling the website source code and picking up the interesting words from it. It comes preloaded with Kali Linux. If it is not present on your Linux machine you can get it from here. … Read more

Watch hackers break into the US power grid – HackingVision

Watch hackers

Watch hackers break into the US power grid – HackingVision Watch hackers: A power company in the Midwest hired a group of white hat hackers known as RedTeam Security team to test its security defenses. Tech Insider followed them around for 3 days, as the RedTeam attempted to break into buildings and hack into its … Read more

Cupp: A Target Specific Wordlist Generator

cupp

Have you ever tried keeping password which has your partner, pet or any other specific name or date related to you? If your answer is yes, then you are gonna change your password after reading this article. A target specific wordlist generator tool dubbed “cupp”, can easily guess your password. It does so by performing … Read more

Findsploit – Find exploits in local and online databases instantly

findsploit

Find exploits in local and online databases instantly Finsploit is a simple bash script to quickly and easily search both local and online exploit databases. This repository also includes “copysploit” to copy any exploit-db exploit to the current directory and “compilesploit” to automatically compile and run any C exploit (ie. ./copysploit 1337.c && ./compilesploit 1337.c). … Read more

Hack Captive Portal – Hack any Captive portal using MAC-spoofing technique

captive-portal

Hack Captive portals script Hack any Captive portal using MAC-spoofing technique This script is using MAC-spoofing technique. This method is the only one which is present in all wireless and some wired Captive portals by design. Once a host is authorized by the Captive portal, its MAC and IP address are allowed unrestricted access. All … Read more

AndroBugs Framework – Android vulnerability scanner

Android scanner

Android Scanner AndroBugs Framework Android Scanner AndroBugs Framework is an efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications. No need to install on Windows. AndroBugs Framework is an Android vulnerability analysis system that helps developers or hackers find potential security vulnerabilities in Android applications. No splendid GUI … Read more

Habu – Python Network Hacking Toolkit

computer-network

Habu: Network Hacking Toolkit I’m developing Habu to teach (and learn) some concepts about Python and Network Hacking. These are basic functions that help with some tasks for Ethical Hacking and Penetration Testing. Most of them are related with networking, and the implementations are intended to be understandable for who wants to read the source … Read more