Browsing category

Hackers Repository

Rollmac – Bypass Free Wifi Time & Data Restriction

Rollmac (Credits: violentshell) Free networks often impose either a time or data restriction and this can be used quickly. When this happens you can change your mac address and reconnect, but this is annoying, and it takes time. In addition, most networks will ask you to re-accept the terms and conditions of the network in […]

CIA’s Grasshopper Windows Hacking Framework Revealed

Trending website WikiLeaks today April 7th, 2017, released new 27 documents of vault 7 series of leaked documents, which belonged to US Central Intelligence Agency (CIA). The Framework named Grasshopper was built by CIA to make customized malware, payloads to bypass the antivirus and hack into Windows operating system. According to WikiLeaks, the Grasshopper framework […]

Exploit XSS with an Image: Force download

Welcome back today we will talk about Injecting some malicious XSS code into a Image. We will be using Kali Linux for this tutorial however you can use an operating system of your choice. We recommend using Linux. If you don’t already have Linux you can download Kali Linux from here. Cross Site Scripting is […]

V3n0M-Scanner – Python Pentesting Scanner

Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns. [Live Project – Python3.6] https://github.com/v3n0m-Scanner/V3n0M-Scanner V3n0M is a free and open source scanner. Evolved from baltazar’s scanner, it has adapted several new features that improve fuctionality and usability. It is mostly experimental software. This program is for finding and executing various vulnerabilities. It scavenges the […]

EaST – Exploits and Security Tools Framework 2.0.0

Exploits and Security Tools Framework 2.0.0 (Credits C0reL0ader) http://eastfw.com/ «EAST» – «Exploits And Security Tools» penetration testing framework. Overview Pentest framework environment is the basis of IT security specialist’s toolkit. This software is essential as for learning and improving of knowledge in IT systems attacks and for inspections and proactive protection. The need of native […]

Inside Internet Security – What Hackers Don’t want You To Know – Addison Wesley 2002 [E-Book]

This book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It arms systems administrators with a thorough understanding of the problems of network security and their solutions, and thus helps realize the tremendous potential of e-business. With the explosion […]

Browser Extension Shows How Facebook AI Handles Your Data

Browser Extension shows how Facebook handles and tracks your data using machine learning alogorithms. We recently came across this really cool browser extension unfortunately the mobile extension has been held back. This is a really good extension for showing how Facebook handles data and tracks your data by using machine learning algorithms. Data Selfie is […]

JuNest – Arch Linux distro that runs upon any Linux distro

The Arch Linux based distro that runs upon any Linux distros without root access. JuNest (Jailed User NEST) is a lightweight Arch Linux based distribution that allows to have an isolated GNU/Linux environment inside any generic host GNU/Linux OS and without the need to have root privileges for installing packages. JuNest contains mainly the package […]

WAFNinja – Tool to attack Web Application Firewalls

WAFNinja is a tool which contains two functions to attack Web Application Firewalls. WAFNinja – Penetration testers favorite for WAF Bypassing WAFNinja is a CLI tool written in Python. It shall help penetration testers to bypass a WAF by automating steps necessary for bypassing input validation. The tool was created with the objective to be […]

The First Human ChatBot to understand Emotions

Today Researchers have been finding a way to make Robots and Artificial intelligence part of our daily life. Artificial intelligent again is just like a Wikipedia talking to you without any emotions. What if one can add emotions to them? Yes! A New-Zealand based startup called “Soul Machines”, have come up with an idea of […]

Researcher Developed A WMI-Based Hacking Tool in PowerShell

Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for combining the management of devices and applications in a network from Windows computing systems. The Researcher named  Christopher Truncer released a WMI based Agentless Post-Exploitation Remote Accessing Tool Developed in PowerShell on 23 March 2017 as mentioned in his blog post. Last year […]

OONIprobe – Measure Internet Censorship & Speed

Interested in collecting evidence of Internet censorship? Curious about the speed and performance of the network that you are using?  By running the tests in this app, you will examine the following: Blocking of websites Presence of systems that could be responsible for censorship and/or surveillance Speed and performance of your network These tests have […]

Create an SSH Botnet Client manager Botdr4g0n

The Botdr4g0n is a security tool for DDOS attack on SSH BOT management for distributed attacks. How to Install python 2.7 git clone https://github.com/mh4x0f/botdr4g0n.git cd botdr4g0n python setup.py install root@local:~# botdr4g0n _ _ _ _ _ ___ | |__ ___ | |_ __| |_ __| || | __ _ / _ _ __ | ‘_ […]

DevKnox – Autocorrect Security Issues As You Write Code

DevKnox is a first of its kind security tool that enables developers to detect and resolve security issues as they write code in Android Studio. While it checks for basic security issues, developers also get real-time suggestions to fix these issues instantly. Consider it to be like an autocorrect for security issues. Key features of Devknox: […]

RCE Finder – Scan For Remote Code Execution Exploits

RCE_FINDER How to use root@kali:/rce_finder # python scan_rce.py # LOGO ########################################## #| By Rudra Sarkar – @rudr4_sarkar # #| Loaded Modules : 1 # ########################################## [!] Scan URL or List of URLs? [1/2]: 1 [!] Enter the URL: https://www.test.com/testing?oqa=client_eh [!] Finding for Remote Code/Command Execution [!] Covering Operating Systems [!] Please wait …. [+] Vulnerablity […]

Clickbait Detector – Detects Clickbait Headlines Using Deep Learning.

Clickbait Detector Detects clickbait headlines using deep learning. If you like this software please consider leaving the author a star on github. Find the Chrome Extension here ( built by rahulkapoor90 ) Requirements Python 2.7.12 Keras 1.2.1 Tensorflow 0.12.1 Numpy 1.11.1 NLTK 3.2.1 Getting Started Install a virtualenv in the project directory virtualenv venv Activate […]