Making Yourself A Free Text To Speech Program In Linux in 5 Minutes!

comspeak2

Here is a small project on how to make a simple bash script to make your computer speak what you have highlighted in a web browser, consider it as a personal assistant to read the text out. You can use it while doing some other things, don’t expect it to be so perfect with the … Read moreMaking Yourself A Free Text To Speech Program In Linux in 5 Minutes!

Microsploit (Office Exploitation Tool)

microsploit

a Simple tool and not very special but this tool fast and easy create backdoor office exploitation using module metasploit packet. Like Microsoft Office in windows or mac , Open Office in linux , Macro attack , Buffer Overflow in word . Work in kali rolling , Parrot , Backbox . Install Microsploit git clone … Read moreMicrosploit (Office Exploitation Tool)

How to increase volume above 100% in Linux

volume

How to increase volume above 100% in Linux Welcome back today I will show you how to increase volume settings above 100% in Linux. Warning only exceed volumes your speakers can handle. In a Linux based operating system open a new command terminal & enter command. apt-get install pulseaudio Next we need to install pavucontrol … Read moreHow to increase volume above 100% in Linux

APs_Beacon – With this script you can spam WiFi APs/Hotspots

aps_becon

With this script you can spam WiFi APs. How to run it? Download “APs_Beacon.sh” and “SSID_List.txt” or type “git clone https://github.com/BlueArduino20/APs_Beacon“ You need to give execution permissions by typing: “chmod +x APs_Beacon.sh” You open the script: “./APs_Beacon.sh” That’s all. CREDITS: BlueArduino20 DOWNLOAD APs_Beacon We recommend usage of an external wifi adaptor for better results. If … Read moreAPs_Beacon – With this script you can spam WiFi APs/Hotspots

LAF – Linux Application Firewall (LAF) application firewall for Linux

fire-wall

Requirements LAF requires libnetfilter-queue, it’s dependency libnfnetlink and a kernel 2.6.14 or later. sudo apt-get install libnfnetlink-dev libnetfilter-queue-dev Install Help Needed If you are a C or a Python developer you can help us improve LAF. Feel free to take a look at the bug tracker for some tasks to do. License LAF is licensed … Read moreLAF – Linux Application Firewall (LAF) application firewall for Linux

Kali Linux Hacking eBooks Download in PDF 2019

kali linux hacking

Kali Linux Hacking List of Free Kali Linux Hacking eBooks Download In PDF 2019 Ethical Hacking, Hacking ebooks pdf, Hacking ebooks free download, hacking ebooks collection, Best Hacking eBooks. List curated by Hackingvision.com Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to … Read moreKali Linux Hacking eBooks Download in PDF 2019

DRLM – Disaster Recovery Linux Manager

hdd

Disaster Recovery Linux Manager (DRLM) Disaster Recovery Linux Manager (DRLM) Is a Central Management Open Source Software for Linux Disaster Recovery and System Migrations, based on Relax-and-Recover (ReaR). DRLM provides Central Management and Deployment from small to large Linux Disaster Recovery Implementations bringing a great Centralized Management Tool to Linux SysAdmins. With DRLM SysAdmins can … Read moreDRLM – Disaster Recovery Linux Manager

Maybe – See what a program does before deciding whether you really want it to happen

maybe

See what a program does before deciding whether you really want it to happen. rm -rf pic* Are you sure? Are you one hundred percent sure? maybe… … allows you to run a command and see what it does to your files without actually doing it! After reviewing the operations listed, you can then decide … Read moreMaybe – See what a program does before deciding whether you really want it to happen

KICKthemOUT3 – KICK devices off your NETW0RK

kickthemout

K1CK devices off your N3TW0RK by performing an ARP Spoof attack with Python3+ compatability A tool to kick devices out of your network and enjoy all the bandwidth for yourself. It allows you to select specific or all devices and ARP spoofs them off your local area network. It works mainly in Python3  This is … Read moreKICKthemOUT3 – KICK devices off your NETW0RK

KnockMail – Verify if email exists

knockmail

KnockMail Verify if email exists Copyright 2017 KnockMail Written by: * Alisson Moretto – 4w4k3 Twitter: @4w4k3Official Cloning: git clone https://github.com/4w4k3/KnockMail.git Running: cd KnockMail sudo su pip install -r requeriments.txt python knock.py If you have another version of Python: python2.7 knock.py Screen DISCLAIMER: “DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE … Read moreKnockMail – Verify if email exists

WiFi Frequency Hacker – Regulatory Domain Configuration That Doesn’t Limit You

wifi

wifi-frequency-hacker A modified frequency regulatory domain configuration that doesn’t limit you. Overview Different countries enforce different frequency restrictions on the various wifi channels. This can be a pain if your card/OS is forcing you into a different configuration than the one you need. There are numerous reasons why this may be happening. From drivers favouring … Read moreWiFi Frequency Hacker – Regulatory Domain Configuration That Doesn’t Limit You

SCUTUM – Linux ARP (TCP / UDP / ICMP) Firewall Automatic Controller

scutum-firewall

SCUTUM Firewall Linux ARP (TCP / UDP / ICMP) Firewall Automatic Controller Current Version: 2.4.3 Current Version Change log: Added option to choose whether to delete the installer file after installation Fixed arptables detection errors on some Linux distributions Fixed some bugs that is unnoticeable 😀 TODO: Use a class to control network interfaces individually … Read moreSCUTUM – Linux ARP (TCP / UDP / ICMP) Firewall Automatic Controller

SSL Kill – Forced Man-In-The-Middle HTTPs-Avoiding Transparent Proxy

sslkill

SSL Kill – Forced Man-In-The-Middle HTTPs-Avoiding Transparent Proxy SSL Kill is a forced man-in-the-middle transparent proxy that modifies HTTP requests and responses in order to avoid SSL and HSTS, to achieve that, it use a two-way ARP spoofing plus a forced DNS resolver that redirects all name server queries to the attacker IP Address. This … Read moreSSL Kill – Forced Man-In-The-Middle HTTPs-Avoiding Transparent Proxy

BinGoo! A Linux bash based Bing and Google Dorking Tool

google-dorks-bash

BinGoo! A Linux bash based Bing and Google Dorking Tool Welcome to the BinGoo README file! This should give you a general overview of what the tool is all about and how to go about using it. This is a the result of a project of mine to come up with better solution for gathering … Read moreBinGoo! A Linux bash based Bing and Google Dorking Tool

GonnaCry – Linux Ransomware That Encrypts All User Files

linux-pad-lock

Read our disclaimer before you continue. This tool is only provided as a convince any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors of hackingvision.com will … Read moreGonnaCry – Linux Ransomware That Encrypts All User Files

Windows crypto-ransomware POC

Ransomware

Windows crypto-ransomware POC Credits: mauri870 Note: This project is purely academic, use at your own risk. I do not encourage in any way the use of this software illegally or to attack targets without their previous authorization The intent here is to disseminate and teach more about security in the actual world. Remember, security is … Read moreWindows crypto-ransomware POC

CloudFail – Utilize misconfigured DNS Find hidden IP’s behind the CloudFlare network

cloudfail

CloudFail Credits: m0rtem CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases. Misconfigured DNS scan using DNSDumpster.com. Scan the … Read moreCloudFail – Utilize misconfigured DNS Find hidden IP’s behind the CloudFlare network

Makemon – Create Single or Multiple Monitor Mode WiFi Interfaces

Makemon Make a single (or up to 10) monitor mode wireless interfaces with unique mac addresses. Credits: Yo-kai-Sei-shin-kage # makemon by Yokai Seishinkage # Make a single (or up to 10) monitor mode wireless interfaces with unique mac addresses. Dependencies 1.) iw 2.) macchanger Installation Move “makemon” to “/usr/bin/” directory/folder or any directory you choose … Read moreMakemon – Create Single or Multiple Monitor Mode WiFi Interfaces

Create Customized .onion Addresses For Tor Hidden Services

tor

Create Customized .onion Addresses For Tor Hidden Services Tor’s .onion links can often look quite random in this article I will show you how to create customized .onion address for use with Tor’s hidden services. Customized .onion links can often help other Tor users find and recognize your site easier. For example take Facebook’s .onion … Read moreCreate Customized .onion Addresses For Tor Hidden Services

Self Destructing Encrypted LUKs Partitions Emergency Nuke Kali Linux

Self Destructing Encrypted LUKs Partitions Emergency Nuke Kali Linux   Welcome back today I will show you to set up a self destructing LUKSs partition in Kali Linux this process is often referred to as an emergency nuke. Due to high demand from users the guys over at Kali.org decided to implement LUKs nuke patch … Read moreSelf Destructing Encrypted LUKs Partitions Emergency Nuke Kali Linux

yoast seo premium free