WordSteal – Steal NTML Hashes From Remote Computer WordSteal This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes. The author does not keep responsibility for any illegal action you do. WordSteal This script will create a POC that will steal NTML hashes … Read more
Read our disclaimer before you continue. This tool is only provided as a convince any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors of hackingvision.com will … Read more
Simple Keylogger – A simple keylogger for Windows, Linux and Mac Credits: GiacomoLaw Welcome to the simple keylogger repo! A keylogger is a program that records your keystrokes, and this program saves them in a log file on your local computer. Check out below to learn how to install them. These keyloggers are simple and … Read more
CloudFail – Utilize misconfigured DNS Find hidden IP’s behind the CloudFlare network Credits: m0rtem CloudFail is a tactical reconnaissance tool that aims to gather enough information about a target protected by Cloudflare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has … Read more
State of Surveillance with Edward Snowden and Shane Smith (Vice) on HBO
In the following video Vice’s Shane Smith heads to Moscow to meet and interview NSA whistle blower Edward Snowden about digital privacy and security. This year, when Apple refused an FBI court order to access the iPhone of suspected San Bernardino Terrorist Syed Farook.
Play Music HTML5 Audio XSS Payload The script below allows you to share your favorite mp3 through your target browser. Let’s assume the XSS payload was injected into a web page that supports unrestricted HTML an mp3 audio file would then play to the visitors of the compromised web page. if(document.getElementById(‘xss_audio’) == null ) { … Read more
TP-Link router brute force XSS Payload Based on the WebRTC mechanism to gather IP addresses, this script attempts to perform a dictionnary attack against TP-Link routers login and password. It just requires to define a more realistic dictionary. Payload Author: Kamil Vavra [php]function detectFirefox() { if (navigator.userAgent.toLowerCase().indexOf(‘firefox’) > -1) { //Do Firefox-related activities getLocalIP(); … Read more
EAPHammer – Targeted Evil Twin Attacks WPA2-Enterprise Networks EAPHammer is a toolkit designed by Gabriel Ryan (s0lst1c3) for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope wireless assessments and red team engagements. As such, focus is placed on providing an easy-to-use interface that can be leveraged … Read more
Hacking TOR Hidden Services What is Tor ? Tor stands for The Onion Route it aims to conceal its users identities and their online activity from various surveillance and traffic analysis algorithms. Tor network uses an implement of .onion routing for sites and web applications hosted on the Tor hidden network. Tor encrypts and randomly … Read more
The LAZY script will make your life easier, and of course faster. Credits: arismelachroinos If you like this script follow the project on Github. A video sstec made: https://www.youtube.com/watch?v=gSO7c2MN7TY I AM NOT RESPONSIBLE HOW YOU USE THIS TOOL.BE LEGAL AND NOT STUPID. Please read the following disclaimer https://hackingvision.com This script will make your life easier, … Read more
Explanation of Rootkits & How To Stay Safe From Rootkits In this article I will explain what Rootkits are and how we can stay partially safe from Rootkits. For our new readers when I say partially safe is because no system is ever safe and the manner this type of software is distributed Rootkits can … Read more
Scan Web Servers For Vulnerabilities Using Nikto Kali Linux Scan Web Servers with Nikto Welcome back today we will be talking a little about web vulnerabilities and how we can scan for vulnerabilities in web servers using Nikto. Before attacking a website its vital to do reconnaissance on the target website this helps us gather … Read more
Security Researchers at Fox-IT made a device which can sniff the AES-256 keys from 1m of distance. The AES-256 encryption is been used by Military forces to and many other big organizations to keep their secret data safe. It is also used by the famous crypto currency Bitcoin for blockchain encryption. If the key is … Read more
Prevent ARP spoofing using shARP ARP spoofing is a type of MiTM (Man-in-the-middle) attack it may allow an attacker to intercept data frames on a network as well as modify the traffic and stop traffic from communicating with router or gateway. Often the attack is used as opening for other attacks , such as denial … Read more
Norton explores the secretive world of bulletproof hosting also known as uncensored hosting. Bulletproof hosts are no stranger to security they will often place there data centers in isolated areas such as at sea or inside underground nuclear bunkers. Using bulletproof hosting hackers can create a virus, botnets, C&C servers, malware, ransomware, piracy, black market trading and other menacing activities with very little risk this is becuase bulletproof hosts ignore any abuse complains or are often hosted in a country or region where laws can differ.
HavenCo (Sealand)
Bulletproof hosts such as HavenCo in Sealand ,Sealand is its own Sovereign State Located in international waters, on the military fortress of Roughs Tower, Sealand is the smallest country in the world. The country‘s national motto is E Mare, Libertas (From the Sea, Freedom), reflecting its enduring struggle for liberty through the years. Sealand has been an independent sovereign State since 1967 and is subject to its own laws Sealand also has very little to none tax laws.
HavenCo was founded in Sealand and follows Sealand law read the Constitution of the principality of Sealand.
How to Grab IP Address Using Fake Cloud Hosting Service Welcome back today we will be looking in to grabbing IP address’s using a fake cloud hosting service this will act as a honey pot to grab IP address’s of attackers unsuspectingly while they break into your cloud hosting service and try to steal your … Read more
SEToolkit – Hacking Windows Machines Infectious Media Generator Requirements Linux based Operating System (In this tutorial we are using Kali Linux) SEToolkit (Comes pre-installed in Kali Linux) What is SEToolkit ? The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration testing around … Read more
FaceNiff -Android App Intercept web session profiles over WiFi Connection FaceNiff – Hacking Tool: Faceniff is an Android app for hackers & users who are concerned about their security and want to test their networks for vulnerabilities. Faceniff allows an attacker to easily steal sensitive information such as Facebook, Twitter, Youtube Account Username & Passwords … Read more
DEFCON – The Full Documentary Defcon is the world’s longest running and largest underground hacking conference hosted in Las Vegas it was Started in 1992 by the Dark Tangent (Jeff Moss) an American hacker from the state of California, DEF CON . Hackers, corporate IT professionals and hobbyists all meat every year to discus and trade … Read more
A post-exploitation powershell tool for extracting juicy info from memory. mimikittenz mimikittenz is a post-exploitation powershell tool that utilizes the Windows function ReadProcessMemory() in order to extract plain-text passwords from various target processes. mimikittenz can also easily extract other kinds of juicy info from target processes using regex patterns including but not limited to: TRACK2 … Read more