Browsing tag

scanning

SharpMapExec – A Sharpen Version Of CrackMapExec

  A sharpen version of CrackMapExec. This tool is made to simplify penetration testing of networks and to create a swiss army knife that is made for running on Windows which is often a requirement during insider threat simulation engagements. Besides scanning for access it can be used to identify vulnerable configurations and exfiltrate data. […]

Jok3r, one tool to do all hacking

In most of the cases pentesting is done manually. Where pentester uses all the tools available over the internet to find bugs or vulnerabilities in web applications, mention ethical hacking teachers. Nowdays most often pentesting is done on automated tools. These tools are getting so much attention as these tools save lot of time. Pentester […]

Scan Github popular tools for hacking

Information gathering is a long process in pentesting. There are various tools which gather information from various social media platforms and many other web platforms. But sometimes it is required to gather information from GITHUB, explain ethical hacking professionals. Github as you know a platform for developers where they upload their tools and codes. According […]

Find hacked email addresses

Data breaching in these days have been common. Many of the popular websites are targeted in data breach. This process of data breaching is still continue as many anonymous attackers are using open source tools. There is a popular tool called h8mail which is used to check breach mails. According ethical hacking researcher of International […]

Osmedeus – Automatic Reconnaisance And Scanning In Pentesting

Automatic Reconnaisance and Scanning in Penetration Testing What is Osmedeus? Osmedeus allow you to doing boring stuff in Pentesting automatically like reconnaissance and scanning the target by run the collection of awesome tools. Installation git clone https://github.com/j3ssie/Osmedeus cd Osmedeus chmod +x install.sh ./install.sh How to use Doing normal routine include: Subdomain Scanning, Subdomain TakeOver Scanning, […]

How to Scan Live Hosts With Nmap

Live hosts detection is a very important tool for every penetration tester and ethical hacking. In this tutorial we are going to use Nmap in Kali Linux to scan the network for live hosts. You can use the command ifconfig to determine which IP range you will be scanning for live hosts. We will be […]

Tattoo Recognition System Could Identify Criminals Very Soon

Tattoo Recognition System is coming! Recently committed a crime? Do you happen to have a large visible tattoo? Then you could soon be tracked down simply by the body art on your skin, the NIST has suggested. The National Institute of Standards and Technology is working on an algorithm that will essentially be able to […]