Kali Linux best operating system for beginner & professional pentesters 

Kali Linux best

Kali Linux is the best operating system for beginner & professional pen-testers!     Kali Linux is the best operating system for beginner & professional pen-testers!  Kali Linux is an operating system based on Debian that is developed and maintained by Offensive Security and was designed for penetration testing and digital forensics. Kali Linux was … Read moreKali Linux best operating system for beginner & professional pentesters 

Advanced Penetration Testing Hacking 2017 eBook PDF

Advanced Penetration Testing Hacking 2017 Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own risks. DMCA takedown cannot be possible as we are not republishing the books/infringement of code, but we are … Read moreAdvanced Penetration Testing Hacking 2017 eBook PDF

BackdoorMan – Toolkit that helps you find malicious PHP scripts and shells

computer

BackdoorMan BackdoorMan is a toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination. Description A Python open source toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination, it automates the process of detecting the above. Purpose The main purpose … Read moreBackdoorMan – Toolkit that helps you find malicious PHP scripts and shells

Collection of metasploit auxiliary post-modules

metasploit

msf-auxiliarys Collection of metasploit auxiliary post-modules written by pedro ubuntu (r00t-3xp10it) Description this working directory contains diferent metasploit auxiliary modules writen by pedro ubuntu (r00t-3xp10it) me to be of assistence in post-exploitation common tasks. Download/Install 1º – Download module from github git clone https://github.com/r00t-3xp10it/msf-auxiliarys.git 2º – edit module to read the description 3º – port module to metasploit … Read moreCollection of metasploit auxiliary post-modules

Top 100 Free Hacking Books PDF Collection – HackingVision

hacking books pdf

List of Free Hacking books PDF. Ethical Hacking, Hacking books pdf, Hacking ebooks free download, hacking ebooks collection, Best Hacking eBooks. This list for everyone who is interested in ethical hacking, beginners or professionals both. These top 100 hacking books pdf list is created based on the public reviews given for the books. List curated … Read moreTop 100 Free Hacking Books PDF Collection – HackingVision

bettercap-ng – complete reimplementation of bettercap

bettercap-ng

bettercap-ng is a complete reimplementation of bettercap, the Swiss army knife for network attacks and monitoring. It is faster, stabler, smaller, easier to install and to use. Using it with Docker In this repository, BetterCAP is containerized using Alpine Linux – a security-oriented, lightweight Linux distribution based on musl libc and busybox. The resulting Docker … Read morebettercap-ng – complete reimplementation of bettercap

Microsploit (Office Exploitation Tool)

microsploit

a Simple tool and not very special but this tool fast and easy create backdoor office exploitation using module metasploit packet. Like Microsoft Office in windows or mac , Open Office in linux , Macro attack , Buffer Overflow in word . Work in kali rolling , Parrot , Backbox . Install Microsploit git clone … Read moreMicrosploit (Office Exploitation Tool)

Brute Force Patator – Multi-purpose brute-forcer modular design

brute-force

Brute-Force Patator – Multi-purpose brute-forcer modular design Brute-Force Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage. Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create yet another … Read moreBrute Force Patator – Multi-purpose brute-forcer modular design

Crunch-Cracker – Generate Wordlists and crack Wifi (WEP, WPA/WP2)

crunch-cracker-1

Generate a Wordlist and crack Wifi (WEP, WPA/WP2). Wordlist generator and Wifi Cracker Crunch-Cracker 1.0 beta Function crunch simple Wordlist generator Date: 10/10/2016 Dev: Shell Crunch-Cracker 1.1 Automate Wordlist generator Setting menu Multilingual Graphic Date: 23/04/2017 Langage:ENG, FR, ESP Dev: Shell Crunch-Cracker 1.2 Automate Wordlist generator Wifi cracker Function Cracker Graphic Date: 29/04/2017 Langage:ENG, FR, … Read moreCrunch-Cracker – Generate Wordlists and crack Wifi (WEP, WPA/WP2)

Findsploit – Find exploits in local and online databases instantly

findsploit

Find exploits in local and online databases instantly Finsploit is a simple bash script to quickly and easily search both local and online exploit databases. This repository also includes “copysploit” to copy any exploit-db exploit to the current directory and “compilesploit” to automatically compile and run any C exploit (ie. ./copysploit 1337.c && ./compilesploit 1337.c). … Read moreFindsploit – Find exploits in local and online databases instantly

Hack Captive Portal – Hack any Captive portal using MAC-spoofing technique

captive-portal

Hack Captive portals script Hack any Captive portal using MAC-spoofing technique This script is using MAC-spoofing technique. This method is the only one which is present in all wireless and some wired Captive portals by design. Once a host is authorized by the Captive portal, its MAC and IP address are allowed unrestricted access. All … Read moreHack Captive Portal – Hack any Captive portal using MAC-spoofing technique

AndroBugs Framework – Android vulnerability scanner

Android scanner

Android Scanner AndroBugs Framework Android Scanner AndroBugs Framework is an efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications. No need to install on Windows. AndroBugs Framework is an Android vulnerability analysis system that helps developers or hackers find potential security vulnerabilities in Android applications. No splendid GUI … Read moreAndroBugs Framework – Android vulnerability scanner

Habu – Python Network Hacking Toolkit

computer-network

Habu: Network Hacking Toolkit I’m developing Habu to teach (and learn) some concepts about Python and Network Hacking. These are basic functions that help with some tasks for Ethical Hacking and Penetration Testing. Most of them are related with networking, and the implementations are intended to be understandable for who wants to read the source … Read moreHabu – Python Network Hacking Toolkit

BlackOrphan – Tool built with Bash/nodeJs mainly for gaining a remote shell access to a Linux Box

remote-access-tool-rat

BlackOrphan is a tool built with Bash/nodeJs mainly for gaining a remote shell access to a Linux Box BlackOrphan is a tool built with Bash/nodejs mainly for gaining a remote shell access to a linux BoX USAGE clone this repo git clone https://github.com/zombieleet/BlackOrphan.git run blackorphan from the command line ./BlackOrphan1.0 ============================== 1. Create a server … Read moreBlackOrphan – Tool built with Bash/nodeJs mainly for gaining a remote shell access to a Linux Box

MorphAES – IDPS & SandBox & AntiVirus STEALTH KILLER

morphaes

DPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world’s first polymorphic shellcode engine, with metamorphic properties and capability to bypass sandboxes, which makes it undetectable for an IDPS, it’s cross-platform as well and library-independent. Properties: Polymorphism (AES encryption) Metamorphism (logic and constants changing) Platform independent (Linux/BSD/Windows) IDPS stealthing (the total number of possible … Read moreMorphAES – IDPS & SandBox & AntiVirus STEALTH KILLER

Hijacker – Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android

hijacker-airodump

    Hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng, Airodump-ng, MDK3, and Reaver. It offers a simple and easy UI to use these tools without typing commands in a console and copy&pasting MAC addresses. This application requires an ARM android device with a wireless adapter that supports Monitor Mode. A … Read moreHijacker – Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android

Infernal Twin – Wireless hacking – This is automated wireless hacking tool

internet

##Infernal-Wireless v2.6Release 2.6.11 ##Features added and improved: Menu to retrieve logs are added ##Infernal-Wireless v2.6 Release 2.6.10 ##Features added and improved: Added BeeF XSS framework Integration Added HTTP Traffic View within tool Improved Infenral Wireless Attack Visual View of some of the panel improved Improved Basic Authentication during Social engineering assessment over wireless network Infernal-Wireless … Read moreInfernal Twin – Wireless hacking – This is automated wireless hacking tool

TrackerJacker – Tracks WiFi devices by capturing raw 802.11 frames in monitor mode

wifi

Finds and tracks wifi devices through raw 802.11 monitoring. PyPI page: https://pypi.python.org/pypi/trackerjacker Install pip3 install trackerjacker Usage Find detailed usage like this: trackerjacker -h There are 2 major usage modes for trackerjacker: map mode and track mode: Map mode example Map mode is used to find the Access Points and Devices within the range. Think … Read moreTrackerJacker – Tracks WiFi devices by capturing raw 802.11 frames in monitor mode

CloakifyFactory – Data Exfiltration & Infiltration In Plain Sight

CloakifyFactory & the Cloakify Toolset – Data Exfiltration & Infiltration In Plain Sight; Evade DLP/MLS Devices; Social Engineering of Analysts; Defeat Data Whitelisting Controls; Evade AV Detection. Text-based steganography usings lists. Convert any file type (e.g. executables, Office, Zip, images) into a list of everyday strings. Very simple tools, powerful concept, limited only by your … Read moreCloakifyFactory – Data Exfiltration & Infiltration In Plain Sight

Git All the Payloads! A collection of web attack payloads

payloads

payloads Git All the Payloads! A collection of web attack payloads. Pull requests are welcome! Credits: foospidy Usage run ./get.sh to download external payloads and unzip any payload files that are compressed. Payload Credits fuzzdb – https://github.com/fuzzdb-project/fuzzdb SecLists – https://github.com/danielmiessler/SecLists xsuperbug – https://github.com/xsuperbug/payloads NickSanzotta – https://github.com/NickSanzotta 7ioSecurity – https://github.com/7ioSecurity/XSS-Payloads shadsidd – https://github.com/shadsidd shikari1337 – https://www.shikari1337.com/list-of-xss-payloads-for-cross-site-scripting/ … Read moreGit All the Payloads! A collection of web attack payloads

Subscribe to our newsletter!

yoast seo premium free