50 Best Hacking & Forensics Tools Included in Kali Linux

Best Hacking

50 Best Hacking & Forensics Tools Included in Kali Linux 50 Best Hacking & Forensics Tools Included in Kali Linux: Welcome to HackingVision, in this article we will list the best 50 hacking & forensics tools that are included in Kali Linux. Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains … Read more50 Best Hacking & Forensics Tools Included in Kali Linux

How to increase volume above 100% in Linux

volume

How to increase volume above 100% in Linux Welcome back today I will show you how to increase volume settings above 100% in Linux. Warning only exceed volumes your speakers can handle. In a Linux based operating system open a new command terminal & enter command. apt-get install pulseaudio Next we need to install pavucontrol … Read moreHow to increase volume above 100% in Linux

LAF – Linux Application Firewall (LAF) application firewall for Linux

fire-wall

Requirements LAF requires libnetfilter-queue, it’s dependency libnfnetlink and a kernel 2.6.14 or later. sudo apt-get install libnfnetlink-dev libnetfilter-queue-dev Install [php] Install the required dependencies. sudo apt-get install libnfnetlink-dev libnetfilter-queue-dev Compile with make: make Run [clang](http://clang-analyzer.llvm.org/scan-build.html) static analyser: scan-build make Create an iptables rule: sudo iptables -A OUTPUT -p all -j NFQUEUE –queue-num 0 Add entries … Read moreLAF – Linux Application Firewall (LAF) application firewall for Linux

Kali Linux Hacking eBooks Download in PDF 2019

kali linux hacking

Kali Linux Hacking List of Free Kali Linux Hacking eBooks Download In PDF 2019 Ethical Hacking, Hacking ebooks pdf, Hacking ebooks free download, hacking ebooks collection, Best Hacking eBooks. List curated by Hackingvision.com Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to … Read moreKali Linux Hacking eBooks Download in PDF 2019

DRLM – Disaster Recovery Linux Manager

hdd

Disaster Recovery Linux Manager (DRLM) Disaster Recovery Linux Manager (DRLM) Is a Central Management Open Source Software for Linux Disaster Recovery and System Migrations, based on Relax-and-Recover (ReaR). DRLM provides Central Management and Deployment from small to large Linux Disaster Recovery Implementations bringing a great Centralized Management Tool to Linux SysAdmins. With DRLM SysAdmins can … Read moreDRLM – Disaster Recovery Linux Manager

Free Cyber Security & Hacking eBooks

libary

A curated list of free Security and Pentesting related E-Books available on the Internet. If you want to contribute to this list (please do), send a pull request. All contributors will be recognized and appreciated. The topics include: Android & iOS Cloud Security Defensive Security IoT Malware Analysis & Forensics Network Pentesting Offensive Security Programming … Read moreFree Cyber Security & Hacking eBooks

HERCULES – Special payload generator that can bypass anti-virus software

hercules

HERCULES is a customizable payload generator that can bypass anti-virus software. HackingVision installation tips: HERCULES is programmed in Go if your using Go for the first time you will need to set a GOPATH you can do this by using the following commands. export GOPATH=$HOME/go export PATH=$PATH:$GOROOT/bin:$GOPATH/bin You can add default GOPATH to ~/.bashrc to … Read moreHERCULES – Special payload generator that can bypass anti-virus software

Maybe – See what a program does before deciding whether you really want it to happen

maybe

See what a program does before deciding whether you really want it to happen. rm -rf pic* Are you sure? Are you one hundred percent sure? maybe… … allows you to run a command and see what it does to your files without actually doing it! After reviewing the operations listed, you can then decide … Read moreMaybe – See what a program does before deciding whether you really want it to happen

Repulsive Grizzly – Application Layer DoS Testing Framework

grizzly

Application Layer DoS Testing Framework What is Repulsive Grizzly? Repulsive Grizzly is an application layer load testing framework specifically designed to support high throughput and sophisticated request types. Repulsive Grizzly can help you confirm application layer Denial of Service (DoS) by running your test at a higher concurrency with other features such as session round … Read moreRepulsive Grizzly – Application Layer DoS Testing Framework

KatanaFramework – The New Hacking Framework

ABOUT. katana is a framework written in python for making penetration testing, based on a simple and comprehensive structure for anyone to use, modify and share, the goal is to unify tools serve for professional when making a penetration test or simply as a routine tool, The current version is not completely stable, is recommended … Read moreKatanaFramework – The New Hacking Framework

Arachni – Web Application Security Scanner Framework

arachni

Synopsis Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications. It is smart, it trains itself by monitoring and learning from the web application’s behavior during the scan process and is able to perform meta-analysis using a number of factors in order to … Read moreArachni – Web Application Security Scanner Framework

KICKthemOUT3 – KICK devices off your NETW0RK

kickthemout

K1CK devices off your N3TW0RK by performing an ARP Spoof attack with Python3+ compatability A tool to kick devices out of your network and enjoy all the bandwidth for yourself. It allows you to select specific or all devices and ARP spoofs them off your local area network. It works mainly in Python3  This is … Read moreKICKthemOUT3 – KICK devices off your NETW0RK

KnockMail – Verify if email exists

knockmail

KnockMail Verify if email exists Copyright 2017 KnockMail Written by: * Alisson Moretto – 4w4k3 Twitter: @4w4k3Official Cloning: git clone https://github.com/4w4k3/KnockMail.git Running: cd KnockMail sudo su pip install -r requeriments.txt python knock.py If you have another version of Python: python2.7 knock.py Screen DISCLAIMER: “DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE … Read moreKnockMail – Verify if email exists

Umbrella – A Phishing Dropper designed to Pentest

umbrella-dropper

Umbrella Dropper Copyright 2017 Umbrella Written by: * Alisson Moretto – 4w4k3 Umbrella is a file dropper dedicated to pentest, its download files on target system are execute them without a double execution of exe, only of embed. To compromise the same target again, you need delete this folder on target system : – C:\Users\Public\Libraries\Intel … Read moreUmbrella – A Phishing Dropper designed to Pentest

SCUTUM – Linux ARP (TCP / UDP / ICMP) Firewall Automatic Controller

scutum-firewall

SCUTUM Firewall Linux ARP (TCP / UDP / ICMP) Firewall Automatic Controller Current Version: 2.4.3 Current Version Change log: Added option to choose whether to delete the installer file after installation Fixed arptables detection errors on some Linux distributions Fixed some bugs that is unnoticeable 😀 TODO: Use a class to control network interfaces individually … Read moreSCUTUM – Linux ARP (TCP / UDP / ICMP) Firewall Automatic Controller

WordSteal – Steal NTML Hashes From Remote Computer

WordSteal

WordSteal – Steal NTML Hashes From Remote Computer WordSteal This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes. The author does not keep responsibility for any illegal action you do. WordSteal This script will create a POC that will steal NTML hashes … Read moreWordSteal – Steal NTML Hashes From Remote Computer

Windows crypto-ransomware POC

Ransomware

Windows crypto-ransomware POC Credits: mauri870 Note: This project is purely academic, use at your own risk. I do not encourage in any way the use of this software illegally or to attack targets without their previous authorization The intent here is to disseminate and teach more about security in the actual world. Remember, security is … Read moreWindows crypto-ransomware POC

WhatsPwn 2.0 – Extract sensitive data and inject payloads into any Android devices

whatspwn

WhatsPwn 2.0 – Linux Tool to extract sensitive data and inject payloads into any Android devices. Credits: José Luis Rodríguez Fragoso (jlrodriguezf) here is a new version of the linux tool WhatsPwn which features new payload options like meterpreter injection or the ability to create hidden or visible payloads and inject them into any android … Read moreWhatsPwn 2.0 – Extract sensitive data and inject payloads into any Android devices

Simple Keylogger – A simple keylogger for Windows, Linux and Mac

Simple Keylogger – A simple keylogger for Windows, Linux and Mac Credits: GiacomoLaw Welcome to the simple keylogger repo! A keylogger is a program that records your keystrokes, and this program saves them in a log file on your local computer. Check out below to learn how to install them. These keyloggers are simple and … Read moreSimple Keylogger – A simple keylogger for Windows, Linux and Mac

Hacking Android Smart Phone Using AhMyth Android RAT

android-backdoor

Welcome back, Today I will show you how to hack an Android smart phone to gain remote access. In this tutorial we will be working with a tool called AhMyth an open source remote access tool AhMyth has many features you would expect to see in a RAT such as Geo location monitoring, SMS modules, … Read moreHacking Android Smart Phone Using AhMyth Android RAT

Subscribe to our newsletter!

yoast seo premium free