PowerStager – Script creates an executable stager that downloads selected powershell payload

powerstager

PowerStager: This script creates an executable stager that downloads a selected powershell payload. Contact Author: z0noxz Source: https://github.com/z0noxz/powerstager Email: z0noxz@mail.com Description This script creates an executable stager that downloads a selected powershell payload, loads it into memory and executes it using obfuscated EC methods. The script will also encrypt the stager for dynamic signatures and … Read morePowerStager – Script creates an executable stager that downloads selected powershell payload

Trity – advanced pentesting framework vulnerability testing to cryptography

trity-advanced-pentesting-framework

Trity Trity is an advanced pentesting framework dedicated to everything from vulnerability testing to cryptography. Installation & Usage In order to install this program, it is crucial that you are on a Linux-based distro, preferably Kali-Linux or BackBox. First, git clone. git clone https://github.com/toxic-ig/Trity.git Change directory, and then run the installer script (Must be root … Read moreTrity – advanced pentesting framework vulnerability testing to cryptography

Kali Linux Hacking eBooks Download in PDF 2019

kali linux hacking

Kali Linux Hacking List of Free Kali Linux Hacking eBooks Download In PDF 2019 Ethical Hacking, Hacking ebooks pdf, Hacking ebooks free download, hacking ebooks collection, Best Hacking eBooks. List curated by Hackingvision.com Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to … Read moreKali Linux Hacking eBooks Download in PDF 2019

Phishery – SSL Enabled Basic Auth Credential Harvester with a Word Document Template

phishery

An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector The power of phishery is best demonstrated by setting a Word document’s template to a phishery URL. This causes Microsoft Word to make a request to the URL, resulting in an Authentication Dialog being shown to the end-user. The ability to … Read morePhishery – SSL Enabled Basic Auth Credential Harvester with a Word Document Template

BlueBorne Bluetooth Vulnerability Can Hack a SmartPhone In Seconds

BlueBorne

Bluetooth technology is not a new thing but its starting to become very popular. Bluetooth is now seen in a lot of different areas from SmartPhones, Smart Watches, Cars, IoT devices, Smart TVS, Games Consoles, Security devices, in our homes, smart devices. Bluetooth is used in many industries and areas of technology such as medical … Read moreBlueBorne Bluetooth Vulnerability Can Hack a SmartPhone In Seconds

blueborne-scanner – Bluetooth scanner for blueborne-vulnerable devices

bluetooth

Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit VPN Gate auto-grabber Greetz shouts to sh3llg0d, an0n_l1t3, daemochi, akatz!!!! Overview Bluetooth scanner for blueborne-vulnerable devices, Android only for the moment Quickstart git clone https://github.com/hook-s3c/blueborne-scanner.git cd blueborne-scanner sudo chmod +x ./bluebornescan.py pip install -r ./requirements.txt ./bluebornescan.py Breakdown Scans for local bluetooth devices Looks … Read moreblueborne-scanner – Bluetooth scanner for blueborne-vulnerable devices

ONIOFF – An onion url inspector for inspecting deep web links

onion url

ONIOFF – Onion URL Inspector A simple tool – written in pure python – for inspecting Deep Web URLs (or onions). It takes specified onion links and returns their current status along with the site’s title. Compatible with Python 2.6 & 2.7. Author: Nikolaos Kamarinakis (nikolaskama.me) Installation You can download ONIOFF by cloning the Git … Read moreONIOFF – An onion url inspector for inspecting deep web links

WPSetup Attack Targets Fresh Installations of WordPress

wordpress-installation

Website developers can often leave unfinished installations of WordPress on their servers. This can make it very easy for attackers to gain control over new installations of WordPress. Attackers can not only take over the WordPress website but also the entire hosting cluster that is associated with it. This is known as WPSetup Attack. The … Read moreWPSetup Attack Targets Fresh Installations of WordPress

SimplyEmail – Email recon made fast and easy, with a framework to build on

simply-email

Email recon made fast and easy, with a framework to build on http://CyberSyndicates.com What is the simple email recon tool? This tool was based off the work of theHarvester and kind of a port of the functionality. This was just an expansion of what was used to build theHarvester and will incorporate his work but … Read moreSimplyEmail – Email recon made fast and easy, with a framework to build on

KeyGrabber – Hardware Keylogger – WiFi USB hardware keyloggers

keygrabber-usb

KeyGrabber products are hardware keyloggers. KeyGrabber keystroke recorder has up to 2GB of memory, stored on a FAT file system. The device is completely transparent from computer operation such as anti-virus and security software, there are no software or drivers are required. KeyGrabber supports International keyboard layouts. Product Description One of the world’s smallest and … Read moreKeyGrabber – Hardware Keylogger – WiFi USB hardware keyloggers

Free Cyber Security & Hacking eBooks

libary

A curated list of free Security and Pentesting related E-Books available on the Internet. If you want to contribute to this list (please do), send a pull request. All contributors will be recognized and appreciated. The topics include: Android & iOS Cloud Security Defensive Security IoT Malware Analysis & Forensics Network Pentesting Offensive Security Programming … Read moreFree Cyber Security & Hacking eBooks

Droid-Hunter – Android application vulnerability analysis pentest tool

Droid-Hunter

Droid-Hunter – Android application vulnerability analysis pentest tool Droid-Hunter Android application vulnerability analysis and Android pentest tool .—. .———– / \ __ / —— / / \( )/ —– ╔╦╗╦═╗╔═╗╦╔╦╗ ╦ ╦╦ ╦╔╗╔╔╦╗╔═╗╦═╗ ////// ‘ \/ ` — ║║╠╦╝║ ║║ ║║───╠═╣║ ║║║║ ║ ║╣ ╠╦╝ //// / // : : — ═╩╝╩╚═╚═╝╩═╩╝ ╩ ╩╚═╝╝╚╝ ╩ … Read moreDroid-Hunter – Android application vulnerability analysis pentest tool

QRLJacking – A New Social Engineering Attack Vector

QRLJacking

Find documentation in our Wiki. What is QRLJacking? QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications that rely on the “Login with QR code” feature as a secure way to login into accounts. In a nutshell, the victim scans the attacker’s QR … Read moreQRLJacking – A New Social Engineering Attack Vector

HERCULES – Special payload generator that can bypass anti-virus software

hercules

HERCULES is a customizable payload generator that can bypass anti-virus software. HackingVision installation tips: HERCULES is programmed in Go if your using Go for the first time you will need to set a GOPATH you can do this by using the following commands. export GOPATH=$HOME/go export PATH=$PATH:$GOROOT/bin:$GOPATH/bin You can add default GOPATH to ~/.bashrc to … Read moreHERCULES – Special payload generator that can bypass anti-virus software

Crack Rar Zip rarPasswordCracker – Bruteforce ZIP/RAR files

Crack Rar

Crack Rar Zip files: rarPasswordCracker – Bruteforces a password protected rar/zip file Crack Rar Zip files: Rar/Zip Password Cracker in python. Software Author notes: I had to brute-force a RAR file in a CTF so wrote some ad-hoc code in python. Works in Linux/Windows.  How to use rarPasswordCrackerWindowsInstall Python if you have not already done so.launch … Read moreCrack Rar Zip rarPasswordCracker – Bruteforce ZIP/RAR files

Windows Exploit Suggester – This tool compares a targets patch levels

Windows Exploit

Windows Exploit Suggester – This tool compares a targets patch levels DESCRIPTION Windows Exploit Suggester This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins. … Read moreWindows Exploit Suggester – This tool compares a targets patch levels

Micetrap – Catch evil hackers on the fly by placing open-port traps

mousetrap

#micetrap ___ .-| | |_/,| (\ { | | |o o |__ _) ) “-.|___| _.( T ) / .–‘–. _((_^–‘ /< .+|_|.-||)`-‘(((/ (((/Catch hackers on the fly with micetrap! Micetrap opens a server on either a given or random port, emulating fake vulnerable services. Port scanners such as Nmap, when fingerprinting ports to discover … Read moreMicetrap – Catch evil hackers on the fly by placing open-port traps

Phishing Frenzy – Ruby on Rails Phishing Framework

phishing-frenzy

Ruby on Rails Phishing Framework Documentation & Info Relevant up to date documentation can be found on the official Phishing Frenzy website located below Phishing Frenzy Website Please submit any tickets or issues to the github issues page Phishing Frenzy Tickets To contact us directly plese use the official Phishing Frenzy website Phishing Frenzy Website … Read morePhishing Frenzy – Ruby on Rails Phishing Framework

Gophish – Open-Source Phishing Toolkit

do-not-feed-the-phish

Gophish: Open-Source Phishing Toolkit Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness training. Current Status Update 2/19/2017 Gophish version 0.2.1 binaries will be released soon! I am just fixing a few final bugs and then … Read moreGophish – Open-Source Phishing Toolkit

mitmAP – python program to create a fake AP and sniff data

wlan

mitmAP – A python program to create a fake AP and sniff data. _ _ ___ ______ (_) | / _ \ | ___ \ _ __ ___ _| |_ _ __ ___ / /_\ \| |_/ / | ‘_ ` _ \| | __| ‘_ ` _ \| _ || __/ | | | … Read moremitmAP – python program to create a fake AP and sniff data

Subscribe to our newsletter!

yoast seo premium free