How to Enable/Fix Bluetooth Problem in Kali Linux 2017.3

If you are running Kali Linux and your Bluetooth is not working. Let’s fix that. It will be up and running in no time. First of all, open a terminal window. then type this command sudo lsmod | grep bluetooth This will search for “bluetooth” in the lsmod. Now you need to enable bluetooth using […]

Fsociety Hacking Tools Pack – A Penetration Testing Framework – Kali Linux 2017.3

A Penetration Testing Framework, you will have every script that a hacker needs Fsociety: https://github.com/Manisso/fsociety Menu Information Gathering Password Attacks Wireless Testing Exploitation Tools Sniffing & Spoofing Web Hacking Private Web Hacking Post Exploitation INSTALL & UPDATE Information Gathering: Nmap Setoolkit Port Scanning Host To IP wordpress user CMS scanner XSStrike Dork – Google Dorks […]

RED HAWK v2 – All In One Tool for Information Gathering and Vulnerability Scanning – Kali Linux 2017.3

All in one tool for Information Gathering and Vulnerability Scanning RED HAWK : https://github.com/Tuhinshubhra/RED_HAWK Scans That You Can Perform Using RED HAWK : Basic Scan Site Title NEW IP Address Web Server Detection IMPROVED CMS Detection Cloudflare Detection robots.txt Scanner Whois Lookup IMPROVED Geo-IP Lookup Grab Banners IMPROVED DNS Lookup Subnet Calculator Nmap Port Scan […]

Trape – People Tracker on the Internet – Kali Linux 2017.3

Trape is a recognition tool that allows you to track people, the information you can get is very detailed. We want to teach the world through this, as large Internet companies could monitor you, obtaining information beyond your IP. Trape: https://github.com/boxug/trape Some benefits One of its most enticing functions is the remote recognition of sessions. […]

Findsploit – Find Exploits in Local and Online Databases Instantly – Kali Linux 2017.3

Findsploit is a simple bash script to quickly and easily search both local and online exploit databases. Findsploit:https://github.com/1N3/Findsploit Installation: git clone https://github.com/1N3/Findsploit.git cd Findsploit && ls chmod +x install.sh ./install.sh Usage: Search for all exploits and modules using a single search term: * findsploit <search_term_1> (ie. findsploit apache) Search multiple search terms: * findsploit <search_term_1> […]

XSSSNIPER – An Automatic XSS Discovery Tool – Kali Linux 2017.3

xsssniper is an handy xss discovery tool with mass scanning functionalities. Usage: Usage: xsssniper.py [options] Options: -h, –help show this help message and exit -u URL, –url=URL target URL –post try a post request to target url –data=POST_DATA post data to use –threads=THREADS number of threads –http-proxy=HTTP_PROXY scan behind given proxy (format: 127.0.0.1:80) –tor scan […]

Kali Linux 2017.3 Brings New Hacking Tools — Download ISO And Torrent Files Here

Kali Linux, the leading ethical hacking operating system, is distributed and developed by Offensive Security. In 2016, the developers decided to make a switch to the rolling release model to make sure that Kali Linux is updated at regular intervals. Combining all the latest updates, patches, fixes, and improvements released in past few months, latest […]

How To Use Proxychains To Evade Detection in Kali Linux

The most important thing about doing penetration testing is anonymity, undetectable, or at least hard to be detected. The worst thing that can happen to any pentester is being detected by a security admin, the security technologies such as IDS, firewall, etc., or a forensic investigator. We need more additional tools in order to hide […]

Fixing Update Errors and Updating Official Repositories in Kali Linux

Have you installed Kali Linux and are experiencing issues whilst updating your repositories? Don’t worry this tend to be a common issue on Kali. Warning: unofficial repositories can hold a risks that could effect your system use official and trusted repositories only using third party repositories could compromise or brake your system in the process. […]

How To Create Backdoor In Kali Linux

What is backdoor? A backdoor is a method, often secret, to bypass normal authentication or encryption in an integrated computer system, product, or device (for example, a home router) or its implementation, e.g. as part of a cryptographic system, an algorithm, a chipset or a “computer homunculus” (such as Intel’s AMT technology). Backdoors are often […]

ZeroDoor – A Script Written Lazily For Generating Cross-Platform Backdoors – Kali Linux 2017.2

Hey Guys, In this video i show you a cool script called ZeroDoor which used for Generating Cross-Platform Backdoors. ZeroDoor:https://github.com/Souhardya/Zerodoor A script written lazily for generating reverse shell backdoors on the go whenever you need without any hassle for your daily penetration needs . These backdoors are not James Bond high tech stuff but rather […]

SQLiv – Massive SQL Injection Vulnerability Scanner – Kali Linux 2017.2

Hey Guys, In this video i show you a cool tool called SQLiv which used to scan websites for sql injection. SQLiv:https://github.com/Hadesy2k/sqliv Features: multiple domain scanning with SQL injection dork by Bing, Google, or Yahoo targetted scanning by providing specific domain (with crawling) reverse domain scanning both SQLi scanning and domain info checking are done […]

How To Do Man in the Middle Attack in Kali Linux

Currently, in this tutorial, we are going to perform the man in the middle attack using Kali Linux. Man in the middle attack in Kali Linux The man in the middle attack in Kali Linux (often abbreviated MITM, MitM, MIM, MIM, MITMA) in cryptography and computer security is a form of active eavesdropping in which […]

Kali Linux Commands Cheat Sheet A To Z

Kali Linux commands cheat sheet. All basic commands from A to Z in Kali Linux has been listed below. A apropos : Search Help manual pages (man -k) apt-get : Search for and install software packages (Debian/Ubuntu) aptitude : Search for and install software packages (Debian/Ubuntu) aspell : Spell Checker awk : Find and Replace […]

Vanquish – Kali Linux based Enumeration Orchestrator

Vanquish is a Kali Linux based Enumeration Orchestrator built in Python. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases. The results of each phase are fed into the next phase to identify vulnerabilities that could be leveraged for a remote shell. Vanquish Features So what is so special […]

Generate Shellcodes & Backdoors using ShellSploit Framework and Kali Linux 2017.2

Hey Guys, In this video i show you how to generate shellcodes and Backdoors using ShellSploit Framework and Kali Linux 2017.2. ShellSploit: https://github.com/vasco2016/shellsploit-framework Shellsploit let’s you generate customized shellcodes, backdoors, injectors for various operating system. And let’s you obfuscation every byte via encoders. Dependences root$ sudo pip install capstone root$ sudo pip install readline(Not necessary […]

Yuki Chan – Automated Penetration Testing – Kali Linux 2017.2

Hey Guys, In this video i show you a great tool called Yuki Chan. The Yuki Chan is an Automated Penetration Testing tool this tool will auditing all standard security test method for you. Yuki Chan:https://github.com/Yukinoshita47/Yuki-Chan-The-Auto-Pentest Features: • Automated • Intel-Gathering • Vulnerability Analysis • Security Auditing • OSINT • Tracking • System Enumeration • […]

How to Hack Windows/Mac/Linux using PasteJacking (PasteZort) and Kali Linux 2017.1

Hey Guys, In this video i show you how to use PasteJacking to hack any operating system using PasteZort and Kali Linux 2017.1. PasteZort:https://github.com/ZettaHack/PasteZort Installation and Usage: git clone https://github.com/ZettaHack/PasteZort.git cd PasteZort && ls chmod +x PasteZ0rt.py encode.rb ./PasteZort.py What is Pastejacking? Nearly all browsers allow websites to run commands on the users’ computers. This […]

Spaghetti – Web Application Security Scanner – Kali Linux 2017.1

Hey Guys, In this video i show you a great Web Application Security Scanner called Spaghetti. Spaghetti is a web application security scanner tool. It is designed to find various default and insecure files, configurations and misconfigurations. Spaghetti is built on python2.7 and can run on any platform which has a Python environment. Spaghetti:https://github.com/m4ll0k/Spaghetti Installation: […]

Lynis – Security Auditing Tool for Unix/Linux Systems – Kali Linux 2017.1

Hey Guys, In this video i show you a great Security Auditing Tool for Unix/Linux Systems called Lynis. Lynis is an open source security auditing tool. Used by system administrators, security professionals, and auditors, to evaluate the security defenses of their Linux and UNIX-based systems. It runs on the host itself, so it performs more […]