Browsing tag

kali

MaskPhish – Give A Mask To Phishing URL

  MaskPhish is a simple script to hide phishing URL under a normal looking URL(google.com or facebook.com). Legal Disclaimer: Usage of MaskPhish for attacking targets without prior mutual consent is illegal. It’s the end user’s responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any […]

Kali Linux 2019.4 Hacking OS Comes With An Undercover Mode

The Debian-based Linux distribution Kali Linux is getting its final update for this year. Kali Linux 2019.4 is available for download for penetration testers and ethical hackers. The latest version of Kali Linux comes with a lot of interesting features such as a new desktop environment, a new theme, and the longed-for undercover mode that […]

Kali Linux 2019.3 Released For Ethical Hacking Enthusiasts

Earlier this year in May, the folks at Offensive Security shipped Kali Linux 2019.2 — the second Kali release of 2019. The biggest feature of 2019.2 was the new Nethunter 2019.2 release that supports more than 50 Android smartphones. Going one step further, the developers have released the third point update of the year in […]

Kali Linux 2019.2 Released With NetHunter 2019.2 And New Kernel

Offensive Security, the makers of Kali Linux, have shipped their second release in 2019. The new Kali Linux 2019.2 distribution is now available for ethical hackers and security researchers. This release brings along many bug fixes and updated packages that are surely worth upgrading. Before you move ahead to explore the new changes in Kali […]

Kali Linux 2019.1 Released

Kali Linux 2019.1 is now available for download, updating many of its features, as well as introducing a few more. These include the open-source operating system, Kernal as it updates to version 4.19.13. This OS often receives contributions from thousands of programmers and companies. In addition, Kali condenses Antivirus evasion techniques within its Metasploit framework. Manager of […]

Airba.sh – A POSIX-compliant, Fully Automated WPA PSK Handshake Capture Script Aimed At Penetration Testing

Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. It is compatible with Bash and Android Shell (tested on Kali Linux and Cyanogenmod 10.2) and uses aircrack-ng to scan for clients that are currently connected to access points (AP). Those clients are then deauthenticated in order to capture the […]

Kali Linux 2018.2 Ethical Hacking Distro Is Here: Download ISO And Torrent Files

Earlier this year in February, Offensive Security pushed the first release snapshot of Kali Linux for the year 2018. The Kali developers have already shifted their release model to rolling but they keep releasing these snapshots from time to time to provide a fresh ISOs to new users. Following that tradition, Kali Linux 2018.2 has […]

How to do offensive Penetration Testing with Kali?

We will start with the preparation. We will need some basic skills. Even more important than being able to do research, time management and learn new technical skills, there are less obvious basic skills that will still be very useful to take PWK and pass the OSCP Exam, says a information security professional. One tip […]

Kali Linux For Windows 10 Arrives In Microsoft Store

Installing and running Linux on Windows 10, also called Linux Subsystem on Windows (WSL), is old news. You can already install distros like Ubuntu, SUSE Enterprise Linux, and openSUSE from Windows Store. While we continue to wait for Fedora to arrive on Microsoft Store as promised, another favorite distro–Kali Linux–has already made itself available. This news […]

SocialFish – Ultimate phishing tool with Ngrok integrated

Ultimate phishing tool with Ngrok integrated. PREREQUISITES Python 2.7 Wget from Python PHP TESTED ONKali Linux – ROLLING EDITION CLONE git clone https://github.com/UndeadSec/SocialFish.git RUNNING cd SocialFish sudo pip install -r requirements.txt python SocialFish.py AVAILABLE PAGES+ Facebook: Traditional Facebook login page. Advanced login with Facebook. + Google: Traditional Google login page. Advanced login with Facebook. + […]

Kali Linux 2017.3 Brings New Hacking Tools — Download ISO And Torrent Files Here

Kali Linux, the leading ethical hacking operating system, is distributed and developed by Offensive Security. In 2016, the developers decided to make a switch to the rolling release model to make sure that Kali Linux is updated at regular intervals. Combining all the latest updates, patches, fixes, and improvements released in past few months, latest […]

TROMMEL – Sift Through Directories of Files to Identify Indicators That May Contain Vulnerabilities

TROMMEL sifts through directories of files to identify indicators that may contain vulnerabilities. TROMMEL identifies the following indicators related to: Secure Shell (SSH) key files Secure Socket Layer (SSL) key files Internet Protocol (IP) addresses Uniform Resource Locator (URL) email addresses shell scripts web server binaries configuration files database files specific binaries files (i.e. Dropbear, […]

How to Scan for SMB vulnerabilities using Nmap

Hi there my fellow hackers, we are back with another tutorial. Today we will see how we can use a Nmap script to scan a target host for SMB vulnerabilities. Let’s have a quick glance on what SMB means. SMB basically stands for Server Message Block. When it comes to reputation among security vulnerabilities, SMB is an […]

Hack Like a Pro: Using Sparta for Reconnaissance

As all of you know, reconnaissance is critical to being successful in a pentest or hack. Recon is where we gather all the information we need to determine the best strategy for hacking. Without good recon, we are likely to waste many hours and be unsuccessful. Professional hackers know that good recon is key to […]

Reset Windows Password with Kali

Sometimes we forget our password, or even we want to reset the password of the windows OS of our friends, officemate or anybody laptops in legal way. Today i am going to teach you how to reset a password using our Favorite Penetration Testing Operating System the Kali Linux. Requirements: 1.Kali Operating System (click here) […]