EvilURL – An unicode domain phishing generator for IDN Homograph Attack

(IDN) homograph attack is a way a malicious party may deceive computer users about what remote system they are communicating with, by exploiting the fact that many different characters look alike. This kind of spoofing attack is also known as script spoofing. Unicode incorporates numerous writing systems, and, for a number of reasons, similar-looking characters […]

HERCULES – Special payload generator that can bypass anti-virus software

HERCULES is a customizable payload generator that can bypass anti-virus software. HackingVision installation tips: HERCULES is programmed in Go if your using Go for the first time you will need to set a GOPATH you can do this by using the following commands. export GOPATH=$HOME/go export PATH=$PATH:$GOROOT/bin:$GOPATH/bin You can add default GOPATH to ~/.bashrc to […]

SEToolkit – Hacking Windows Machines Using USB/CD Infectious Media Generator

SEToolkit – Hacking Windows Machines Infectious Media Generator Requirements Linux based Operating System (In this tutorial we are using Kali Linux) SEToolkit (Comes pre-installed in Kali Linux) What is SEToolkit ? The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration testing around […]

Lottery security director hacked random-number generator to rig lotteries

New evidence collected by prosecutors shows lottery machines were rigged to generate predictable numbers on specific days of the year. Last year, the security director of a US lottery was discovered hacking the mechanism of the extraction in order to predict the winning tickets. According to new details revealed by The Des Moines Register, the lottery […]

Petya Ransomware’s Encryption Defeated and Password Generator Released

An individual going by the twitter handle leostone was able to create an algorithm that can generate the password used to decrypt a Petya encrypted computer. In my test this, this algorithm was able to generate my key in 7 seconds. The solution used to generate this key is called a genetic algorithm and is one that that mimics […]