PRINT
PRINT
SEND MAIL
SEND MAIL

Category: Kali Linux

Debian

Cerberus Linux v3

  Cerberus Linux v3  Cerberus is a penetration testing distribution focusing on automation and anonymity , it aims to have the best tools available on the hacking scene tools like Fuzzbunch, Dandespritz, Cobalt strike, Armitage, Metasploit framework and Metasploit community version set up and ready for use!! It includes custom scripts, custom themes, custom icons!Cerberus distribution is based on Debian testing, it has the capability to use 3 repositories to install packages from kali repo,Debian repo, and cyber sec repo! Cerberus is an Angry…

Windows Hacking

Black Window 10 Enterprise

Black Window 10 Enterprise is the first windows based penetration testing distribution with linux integraded ! The system comes activated with a digital license for windows enterprise ! It supports windows apps and linux apps, gui and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of cerberus linux! It has managed to implement cerberus os within windows.Offers the stability of a windows system and it offers the hacking part with a…

Kali Linuxpenetration testingTUTORIALS

Hacking with Empire – PowerShell Post-Exploitation Agent

Hello everyone and welcome to this beginner’s guide to Empire. According to their official website: “Empire is a pure PowerShell post-exploitation agent” built on cryptologically-secure communications and a flexible architecture. Empire – PowerShell post-exploitation agent Empire implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable post-exploitation modules ranging from key loggers to Mimikatz, and adaptable communications to evade network detection, all wrapped up in a usability-focused framework.” In this tutorial we will be covering everything you need to know about this…

Kali Linuxpenetration testingTUTORIALS

Multiple Ways to Exploiting PUT Method

Hi Friends, today’s article is related to exploiting the HTTP PUT method vulnerability through various techniques. First we will determine if the HTTP PUT method is enabled on the target victim machine, post which we will utilize several different methods to upload a Meterpreter reverse shell on the target and compromise the same. Target: Metasploitable 2 Attacker: Kali Linux machine PUT method was originally intended as one of the HTTP method used for file management operations. If the HTTP PUT method is enabled on…

Kali Linuxpenetration testingTUTORIALS

Multiple Ways to Detect HTTP Options

Hi Friends, today we will walkthrough various HTTP Protocol methods and the tools used to extract those available HTTP methods in a web server. As we are already aware that the HTTP protocol comprises of number of methods that can be utilized to not only gather the information from the web server, but can also perform specific actions on the web server. These techniques and methods are helpful for the web application developers in the deployment and testing stage of the web applications. GET…

DistributedKaliKali LinuxMalwoverviewNEW TOOLSProcedureTool

Malwoverview – Tool To Perform An Initial And Quick Triage On Either A Directory Containing Malware Samples Or A Specific Malware Sample

Malwoverview.py is a simple tool to perform an initial and quick triage on a directory containing malware samples (not zipped).This tool aims to :Determining similar executable malware samples (PE/PE+) according to the import table (imphash) and group them by different colors (pay attention to the second column from output). Thus, colors matter! Determining whether executable malware samples are packed or not packed according to the following rules: 2a. Two or more sections with Entropy > 7.0 or < 1.0 ==> Packed. 2b. One one…

Hacked EmailsHacked PasswordsHaveIBeenPwnedKaliKali LinuxNEW TOOLSpwnedOrNotPython Script

pwnedOrNot v1.1.0 – Tool To Find Passwords For Compromised Email Accounts Using HaveIBeenPwned API

pwnedOrNot uses haveibeenpwned v2 api to test email accounts and tries to find the password in Pastebin Dumps.Featureshaveibeenpwned offers a lot of information about the compromised email, some useful information is displayed by this script:Name of BreachDomain NameDate of BreachFabrication statusVerification StatusRetirement statusSpam StatusAnd with all this information pwnedOrNot can easily find passwords for compromised emails if the dump is accessible and it contains the password.Tested onKali Linux 18.2Ubuntu 18.04Kali NethunterTermuxInstallationUbuntu / Kali Linux / Nethunter / Termuxchmod 777 install.sh./install.shUsagepython pwnedornot.py -husage: pwnedornot.py [-h]…

4NonimizerAnonymizingBashBash ScriptKaliKali LinuxNEW TOOLSPrivoxyTORTor Network

4Nonimizer – A Tol For Anonymizing The Public IP Used To Browsing Internet, Managing The Connection To TOR Network And To Different VPNs Providers

It is a bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs providers (OpenVPN), whether free or paid. By default, it includes several pre-configured VPN connections to different peers (.ovpn files) and download the credentials (if the corresponding provider support it). Also, it records each used IP that we use every 300 seconds in log files.This script is enabled as a service in systemd systems and uses a default vpn (VPNBook) at…

Kali LinuxNEW TOOLSPython27Spykeyboard

Spykeyboard – Keylogger Which Sends Us The Data To Our Gmail

This is a script which allows us to generate an undetectable keylogger which sends the captured keys to our gmail mail. Once we generated our keylogger in our kali linux we would have to pass the .py file to a windows machine to convert it to an .exe. The tool is under development.Install module in linux and windows:pip install keyboardCompile to .exeDownload Spykeyboard

Kali Linuxpenetration testingTUTORIALS

Multiple ways to Connect Remote PC using SMB Port

In this article, we will learn how to connect with victim’s machine via SMB port 445, once you have collected username and password to your victim’s PC. To know how collect username and passwords to your remote host via SMB protocol click here and to understand what is SMB protocol, click here Table of content Exploiting Windows Server 2008 R2 via SMB through Metasploit inbuilt exploits: Microsoft Windows Authenticated User Code Execution Microsoft Windows Authenticated Powershell Command Execution Microsoft Windows Authenticated Administration Utility SMB…

DistroKaliKali LinuxNEW TOOLSPenetration Testing DistributionPentesting Distribution

Kali Linux 2018.3 Release – Penetration Testing and Ethical Hacking Linux Distribution

Kali 2018.3 brings the kernel up to version 4.17.0 and while 4.17.0 did not introduce many changes, 4.16.0 had a huge number of additions and improvements including more Spectre and Meltdown fixes, improved power management, and better GPU support.New Tools and Tool UpgradesSince our last release, we have added a number of new tools to the repositories, including:idb – An iOS research / penetration testing toolgdb-peda – Python Exploit Development Assistance for GDBdatasploit – OSINT Framework to perform various recon techniqueskerberoast – Kerberos assessment…