Browsing category

Pentest

Vanquish – Kali Linux based Enumeration Orchestrator

Vanquish is a Kali Linux based Enumeration Orchestrator built in Python. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases. The results of each phase are fed into the next phase to identify vulnerabilities that could be leveraged for a remote shell. Vanquish Features So what is so special […]

WebBreaker – Dynamic Application Security Test Orchestration (DASTO)

Build functional security testing, into your software development and release cycles! WebBreaker provides the capabilities to automate and centrally manage Dynamic Application Security Testing (DAST) as part of your DevOps pipeline. WebBreaker truly enables all members of the Software Security Development Life-Cycle (SDLC), with access to security testing, greater test coverage with increased visibility by […]

Wifite 2 – A complete re-write of Wifite (Automated Wireless Attack Tool)

complete re-write of wifite, a Python script for auditing wireless networks. What’s new? Lots of files instead of “one big script”. Cleaner process management — No longer leaves processes running in the background. UX: Target access points are refreshed every second instead of every 5 seconds. UX: Displays realtime Power level (in db) of currently-attacked […]

portia – Automated Privilege Escalation

Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised Privilege escalation Lateral movement Convenience modules Portia is a genus of jumping spider that feeds on other spiders – known for their intelligent hunting behaviour and problem solving capabilities usually only found […]

WINspect – Powershell-based Windows Security Auditing Toolbox

WINspect is part of a larger project for auditing different areas of Windows environments. It focuses on enumerating different parts of a Windows machine aiming to identify security weaknesses and point to components that need further hardening. The main targets for the current version are domain-joined windows machines. However, some of the functions still apply […]

TorWall – Transparent Tor for Windows

Tallow is a small program that redirects all outbound traffic from a Windows machine via the Tor anonymity network. Any traffic that cannot be handled by Tor, e.g. UDP, is blocked. Tallow also intercepts and handles DNS requests preventing potential leaks. Tallow has several applications, including: “Tor-ifying” applications there were never designed to use Tor […]

UK teenager admits attempt to hack into CIA chief’s computer

A British teenager has admitted trying to hack into the computers of senior US government officials, including the director of the CIA and the deputy director of the FBI. Kane Gamble, 18, pleaded guilty on Friday to 10 charges at Leicester crown court. Besides John Brennan, the then director of the CIA, and Mark Giuliano, […]

Websites using Cryptocurrency Miners will be banned by CloudFlare

Pirate Bay got this the hard way when users on Reddit lately complained regarding the site’s use of such miners. The website eventually backed away from the practice, but not after giving a fair deal. “As you may have seen we are testing a Monero javascript miner,” said the site’s administrators. “This is simply a […]

Facebook is causing Addiction says the man who invented the Like Button

Justin Rosenstein was the inventor and engineer who created the “awesome” feature in 2007 but now worries the mental effects apps are having on people throughout the world. The 34-year-old is so concerned, he has prevented himself from Reddit and Snapchat, and forced strict time-limits on his use of Facebook, News reports. The tech exec […]

Disqus Hacked: More than 17.5 Million Users’ Details Stolen in 2012 Breach

Another day, Another data breach disclosure. This time the popular commenting system has fallen victim to a massive security breach. Disqus, the company which provides a web-based comment plugin for websites and blogs, has admitted that it was breached 5 years ago in July 2012 and hackers stole details of more than 17.5 million users. […]

habu – Network Hacking Toolkit

Habu is to teach (and learn) some concepts about Python and Network Hacking. These are basic functions that help with some tasks for Ethical Hacking and Penetration Testing. Most of them are related with networking, and the implementations are intended to be understandable for who wants to read the source code and learn from that. […]

TeleShadow – Telegram Desktop Session Stealer (Windows)

Stealing desktop telegrams has never been so easy ! Set the email and sender details of the sender and recipient and send it to the victim after compiling. How do I use the session file? Delete everything inside folder at “C:UsersYourNameAppDataRoamingTelegram Desktoptdata” Then Replace Uncompressed files inside tdata folder who resiver from victim to your […]

LFiFreak – An automated LFi Exploiter with Bind/Reverse Shells

LFiFreak is a tool for exploiting local file inclusions using PHP Input, PHP Filter and Data URI methods. Features Works with Windows, Linux and OS X Includes bind and reverse shell for both Windows and Linux Written in Python 2.7 Dependencies BeautifulSoup   Download LFiFreak Download Premium WordPress Themes Free Premium WordPress Themes Download Download […]

U.S. Believes Russian Spies Used Kaspersky Antivirus to Steal NSA Secrets

Do you know—United States Government has banned federal agencies from using Kaspersky antivirus software over spying fear? Though there’s no solid evidence yet available, an article published by WSJ claims that the Russian state-sponsored hackers stole highly classified NSA documents from a contractor in 2015 with the help of a security program made by Russia-based security […]

Apple Allows Uber to Use a Powerful Feature that Lets it Record iPhone Screen

If you are an iPhone user and use Uber app, you would be surprised to know that widely popular ride-hailing app can record your screen secretly. Security researcher Will Strafach recently revealed that Apple selectively grants (what’s known as an “entitlement“) Uber a powerful ability to use the newly introduced screen-recording API with intent to […]

Apple macOS High Sierra Bug Exposes Passwords of Encrypted APFS Volumes As Hint

A severe programming error has been discovered in Apple’s latest macOS High Sierra 10.13 that exposes passwords of encrypted Apple File System (APFS) volumes in plain text. Reported by Matheus Mariano, a Brazilian software developer, the vulnerability affects encrypted volumes using APFS wherein the password hint section is showing the actual password in the plain […]

Generate Shellcodes & Backdoors using ShellSploit Framework and Kali Linux 2017.2

Hey Guys, In this video i show you how to generate shellcodes and Backdoors using ShellSploit Framework and Kali Linux 2017.2. ShellSploit: https://github.com/vasco2016/shellsploit-framework Shellsploit let’s you generate customized shellcodes, backdoors, injectors for various operating system. And let’s you obfuscation every byte via encoders. Dependences root$ sudo pip install capstone root$ sudo pip install readline(Not necessary […]

Yuki Chan – Automated Penetration Testing – Kali Linux 2017.2

Hey Guys, In this video i show you a great tool called Yuki Chan. The Yuki Chan is an Automated Penetration Testing tool this tool will auditing all standard security test method for you. Yuki Chan:https://github.com/Yukinoshita47/Yuki-Chan-The-Auto-Pentest Features: • Automated • Intel-Gathering • Vulnerability Analysis • Security Auditing • OSINT • Tracking • System Enumeration • […]

How to Hack Windows/Mac/Linux using PasteJacking (PasteZort) and Kali Linux 2017.1

Hey Guys, In this video i show you how to use PasteJacking to hack any operating system using PasteZort and Kali Linux 2017.1. PasteZort:https://github.com/ZettaHack/PasteZort Installation and Usage: git clone https://github.com/ZettaHack/PasteZort.git cd PasteZort && ls chmod +x PasteZ0rt.py encode.rb ./PasteZort.py What is Pastejacking? Nearly all browsers allow websites to run commands on the users’ computers. This […]