Browsing category

Hackers Repository

SniffAir – Wireless security framework for wireless pentesting

SniffAir – Wireless security framework for wireless pentesting SniffAir is an open-source wireless security framework which provides the ability to easily parse passively collected wireless data as well as launch sophisticated wireless attacks. SniffAir takes care of the hassle associated with managing large or multiple pcap files while thoroughly cross-examining and analyzing the traffic, looking […]

PingCastle – Active Directory Security Assessment Tool

The risk level regarding Active Directory security has changed. Several vulnerabilities have been made popular with tools like mimikatz or sites likes adsecurity.org. PingCastle is a tool designed to assess quickly the Active Directory security level with a methodology based on risk assessment and a maturity framework. It does not aim at a perfect evaluation […]

50 Free Hacking Ebooks Collection PDF 2019 – HackingVision

50 Free Hacking Ebooks Collection PDF 2019 Ethical Hacking, Hacking ebooks pdf, Hacking ebooks free download, hacking ebooks collection, Best Hacking eBooks. List curated by Hackingvision.com The topics include: Android & iOS Cloud Security Defensive Security IoT Malware Analysis & Forensics Network Pentesting Offensive Security Programming Languages Reverse Engineering SysAdmin Virus Botnet and Malware Wireless Network […]

Dark Web Drug Dealer Sentenced to Five Year Prison Term

The Office of the United States Attorney for the District of Vermont stated that Sam Bent, 33, of Saint Johnsbury, Vermont was sentenced today to a five-year period of incarceration upon his conviction for three counts of money laundering and one count of conspiracy to distribute controlled substances over the Dark Web.  The prison term […]

OWASP Maryam – Framework for Open-Source Intelligence

Maryam is a full-featured open-source intelligence(OSINT) framework written in Python. Complete with independent modules, built in functions, interactive help, and command completion, provides a command-line environment for used forensic and open-source intelligence(OSINT). Maryam is a completely modular framework and makes it easy for even the newest of Python developers to contribute. Each module is a […]

Covenant – Offensive .NET Collaborative C&C Platform for Red Teamers.

Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers. Covenant is an ASP.NET Core, cross-platform application that includes a web-based interface that allows for multi-user collaboration. Features […]

Hacktronian – All In One Hacking Tool For Linux & Android

Pentesing Tools That All Hacker Needs, Hacktronian is an all in one hacking toolkit. HACKTRONIAN Menu : Information Gathering Password Attacks Wireless Testing Exploitation Tools Sniffing & Spoofing Web Hacking Private Web Hacking Post Exploitation Install The HACKTRONIAN Information Gathering: Nmap Setoolkit Port Scanning Host To IP wordpress user CMS scanner XSStrike Dork – Google […]

AsyncRAT – Open-Source Remote Administration Tool For Windows

AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection This project includes the following Access terminal for controlling clients Configurable client manageable via Terminal Log server recording all significant events Features Include: Client screen viewer & recorder Client Antivirus & Integrity manager Client SFTP […]

Invisi-Shell: Bypass all Powershell security features

Hide your powershell script in plain sight! Invisi-Shell bypasses all of Powershell security features (ScriptBlock logging, Module logging, Transcription, AMSI) by hooking .Net assemblies. The hook is performed via CLR Profiler API. This is still a preliminary version intended as a POC. The code works only on x64 processes and tested against Powershell V5.1. Usage […]

Objection – Runtime Mobile Exploration

Objection is a runtime mobile exploration toolkit, powered by Frida. It was built with the aim of helping assess mobile applications and their security posture without the need for a jailbroken or rooted mobile device. For all supported platforms, objection allows the following: Patch iOS and Android applications, embedding a Frida gadget that can be […]

Email2Phonenumber – OSINT tool to Obtain a Target’s Phone Number just by having the Email Address

email2phonenumber is an OSINT tool that allows you to obtain a target’s phone number just by having his email address. This tool helps automate discovering someone’s phone number by abusing password reset design weaknesses and publicly available data. It supports 3 main functions: “scrape” – scrapes websites for phone number digits by initiating password reset […]

PlainSight – Open Source Digital Forensics

PlainSight is a versatile computer forensics environment that allows inexperienced forensic practitioners perform common tasks using powerful open source tools. There are many features included with this framework such as Internet Histories by using Pasco to recover Internet Explorer histories, Mork to recover FireFox/Netscape histories and RegRipper to view typed URLs. With this framework you […]

PTF – Penetration Testers Framework

The PenTesters Framework (PTF) is a Python script designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. As pentesters, we’ve been accustom to the /pentest/ directories or our own toolsets that we want to keep up-to-date all of the time. We have those “go to” tools that we use […]

FalconGate – A Smart Gateway to Stop Hackers and Malware Attacks

An advanced cybersecurity platform to stop Malware, Ransomware, detect cyber attacks and more… Cyber attacks are on the raise and the cyber criminals are continuously improving their tactics and developing new tools and Malware to achieve their goals of breaching their targets, spying, stealing valuable data and cause destructive damage to assets. In recent years […]

Theo – Ethereum Recon and Exploitation Tool

Theo aims to be an exploitation framework and a blockchain recon and interaction tool. Features: Automatic smart contract scanning which generates a list of possible exploits. Sending transactions to exploit a smart contract. Transaction pool monitor. Web3 console Frontrunning and backrunning transactions. Waiting for a list of transactions and sending out others. Estimating gas for […]

AIL framework – Framework for Analysis of Information Leaks

AIL is a modular framework to analyse potential information leaks from unstructured data sources like pastes from Pastebin or similar services or unstructured data streams. AIL framework is flexible and can be extended to support other functionalities to mine or process sensitive information (e.g. data leak prevention). Features Modular architecture to handle streams of unstructured […]

Attack Surface Mapper – Tool to Automate Reconnaissance

Attack Surface Mapper is a reconaissaince tool that uses a mixture of open source intelligence and active techniques to expand the attack surface of your target. You feed in a mixture of one or more domains, subdomains and IP addresses and it uses numerous techniques to find more targets. It enumerates subdomains with bruteforcing and […]

BLUESPAWN – Windows Defense Tool to Empower Blue Teams

BLUESPAWN helps blue teams monitor Windows systems in real-time against active attackers by detecting anomalous activity Why we made BLUESPAWN We’ve created and open-sourced this for a number of reasons which include the following: Move Faster: We wanted tooling specifically designed to quickly identify malicious activity on a system Know our Coverage: We wanted to […]

Keylogger Detector – Detects Stealth Keyloggers

Keylogger Detector is an original solution, created to detect stealth monitoring software, both known and unknown. The intelligent algorithm of Keylogger Detector is entirely based  on specific behavior of key logging software. It doesn’t rely on threat signatures, like most of existing solutions – thus you don’t depend on regular signature updates to be protected. […]