MaskPhish is a simple script to hide phishing URL under a normal looking URL(google.com or facebook.com). Legal Disclaimer: Usage of MaskPhish...
The Debian-based Linux distribution Kali Linux is getting its final update for this year. Kali Linux 2019.4 is available for download for...
Earlier this year in May, the folks at Offensive Security shipped Kali Linux 2019.2 — the second Kali release of 2019. The...
Offensive Security, the makers of Kali Linux, have shipped their second release in 2019. The new Kali Linux 2019.2 distribution is now...
Kali Linux 2019.1 is now available for download, updating many of its features, as well as introducing a few more. These include...
Welcome to our fourth and final release of 2018, Kali Linux 2018.4, which is available for immediate download. This release brings kernel...
msploitego leverages the data gathered in a Metasploit database by enumerating and creating specific entities for services. Services like samba, smtp, snmp,...
Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. It is compatible with Bash and Android...
Earlier this year in February, Offensive Security pushed the first release snapshot of Kali Linux for the year 2018. The Kali developers...
We will start with the preparation. We will need some basic skills. Even more important than being able to do research, time...
Installing and running Linux on Windows 10, also called Linux Subsystem on Windows (WSL), is old news. You can already install distros...
Kali Linux 2018.1 the first release of 2018, this fine release contains all updated packages and bug fixes since our 2017.3 release...
Ultimate phishing tool with Ngrok integrated. PREREQUISITES Python 2.7 Wget from Python PHP TESTED ONKali Linux – ROLLING EDITION CLONE git clone...
One-Lin3r is simple and light-weight framework inspired by the web-delivery module in Metasploit. It consists of various one-liners that aids in penetration...
Kali Linux, the leading ethical hacking operating system, is distributed and developed by Offensive Security. In 2016, the developers decided to make...
TROMMEL sifts through directories of files to identify indicators that may contain vulnerabilities. TROMMEL identifies the following indicators related to: Secure Shell...
Hi there my fellow hackers, we are back with another tutorial. Today we will see how we can use a Nmap script...
Image | Kali.org Short Bytes: Kali Linux, a hacker’s favorite operating system, is now available with first Rolling release. This release ensures...
As all of you know, reconnaissance is critical to being successful in a pentest or hack. Recon is where we gather all...
Cracking Wi-Fi passwords, spoofing accounts, and testing networks for exploits is all fun enough, but if you want to take the...
Sometimes we forget our password, or even we want to reset the password of the windows OS of our friends, officemate or...