PRINT
PRINT
SEND MAIL
SEND MAIL

Tag: linux

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

Access Point AttackBackdoorFactoryBeEFMan-in-the-MiddleMITMNetwork Wireless HackingNEW TOOLSPcapRogue Wi-FiSnoopingWi-FiWiFi-PumpkinWireless Attack Toolkit

WiFi-Pumpkin v0.8.7 – Framework for Rogue Wi-Fi Access Point Attack

The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwarding legitimate traffic to and from the unsuspecting target. It comes stuffed with features, including rogue Wi-Fi access points, deauth attacks on client APs, a probe request and credentials monitor, transparent proxy, Windows update attack, phishing manager, ARP Poisoning, DNS Spoofing, Pumpkin-Proxy, and image capture on the fly. moreover, the WiFi-Pumpkin is a very complete framework for auditing Wi-Fi security check the list of features is quite broad.InstallationPython 2.7…

Brute-forceBugbountybypass-firewalls-by-DNS-historyDNS HistoryDNS RecordFind Origin IPNEW TOOLSWAF Bypass

bypass-firewalls-by-DNS-history – Firewall Bypass Script Based On DNS History Records

This script will try to find:the direct IP address of a server behind a firewall like Cloudflare, Incapsula, SUCURI ...an old server which still running the same (inactive and unmaintained) website, not receiving active traffic because the A DNS record is not pointing towards it. Because it's an outdated and unmaintained website version of the current active one, it is likely vulnerable for various exploits. It might be easier to find SQL injections and access the database of the old website and abuse this…

ChromecastKillcastNEW TOOLSPython3

Killcast – Manipulate Chromecast Devices In Your Network

Manipulate Chromecast Devices in your Network.Inspiration - Thousands of Google Chromecast Devices Hijacked to Promote PewDiePieThis tool is a Proof of Concept and is for Research Purposes Only, killcast shows how Chromecast devices can be easily manipulated and hijacked by anyone.FeaturesExtract Interesting Information such as Build Version, Country, Timezone etcRenameRebootPerform Factory ResetKill Active Applications such as YouTube, Netflix and Google Play MusicWhat is not workingPlay any YouTube VideoUnable to kill Play MusicOther things that we are not aware of ;)Tested On :Kali Linux 2019.1Ubuntu…

Brute Force AttackBrute-forceHediyeMacNEW TOOLSWordlist

Hediye – Hash Generator & Cracker Online Offline

Hash Generator & Cracker Online Offline suported hash:md5sha1sha224sha256sha384sha512Install NoteClone the repository:git clone go inside:cd hediye/use examples:python3 hediye.py -k Key / For --> Generate Hash (md5, sha1, sha224, sha256, sha384, sha512)python3 hediye.py -v HASH -f Wordlist / For --> Brute Force Attackpython3 hediye.py -n HASH / For --> Online SearchGenerate Hashpython3 hediye.py -k 4617165Brute Force AttackOnline SearchDownload Hediye

ElasticsearchExposingMacNEW TOOLSSensitive InformationStretcher

Stretcher – Tool Designed To Help Identify Open Elasticsearch Servers That Are Exposing Sensitive Information

Stretcher is a tool to search for open elasticsearch servers.Usage: python stretcher.py --shodan {key} --action analyze --threads {0..100} --dork python stretcher.py --help _____ __ __ __ / ___// /_________ / /______/ /_ ___ _____ \__ \/ __/ ___/ _ \/ __/ ___/ __ \/ _ \/ ___/ ___/ / /_/ / / __/ /_/ /__/ / / / __/ / /____/\__/_/ \___/\__/\___/_/ /_/\___/_/ Tool designed to help identify incorrectly Applications that are exposing sensitive [+] Interesting indexes were found payment, address, email, user Browser:…

Advanced SQL InjectionAutomatic SQL InjectionMacNEW TOOLSsql injectionSQL Injection ExploitationSQL injection scannerSQL injection test environmentSQLi

SQLMap v1.3 – Automatic SQL Injection And Database Takeover Tool

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.FeaturesFull support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2,…

KaliKali LinuxKali Linux HackingLinux ToolsNEW TOOLSTermuxTermux HackingTermux ToolTool-XTools InstallerUbuntu

Tool-X – A Kali Linux Hacking Tool Installer

What is Tool-X ?Tool-X is a kali linux hacking Tool installer. Tool-X is Developed By Rajkumar Dusad. with the help of Tool-X you can install best hacking tools in Rooted or Non Rooted Android devices. In the Tool-X there are almost 240 hacking tools available for termux app and GNURoot Debian terminal. you can install any tool by single click. Tool-X is Specially made for Termux and GNURoot Debian Terminal. Now Tool-X is available for Ubuntu.How to use ?Type 0 : To install all…

Command LineExrexMacNEW TOOLSRegular Expressions

Exrex – Irregular Methods On Regular Expressions

Exrex is a command line tool and python module that generates all - or random - matching strings to a given regular expression and more. It's pure python, without external dependencies.There are regular expressions with infinite matching strings (eg.: [a-z]+), in these cases exrex limits the maximum length of the infinite parts.Exrex uses generators, so the memory usage does not depend on the number of matching strings.FeaturesGenerating all matching stringsGenerating a random matching stringCounting the number of matching stringsSimplification of regular expressionsInstallationTo install exrex,…

MacNEW TOOLSSecurity AutomationSecurity ResearchSecurity ScannerShodanShodan APIShodan CLIShodan ScriptsShodan ToolShodanploitShodansploitSSH

Shodanploit – Shodan Command Line Interface Written In Python

Shodan is a search engine on the internet where you can find interesting things all over the world. For example, we can find cameras, bitcoin streams, zombie computers, ports with weakness in service, SCADA systems, and more. Moreover, more specific searches are possible. As a result of the search, Shodan shows us the number of vulnerable hosts on Earth.So what does shodansploit do ?With Shodan Exploit, you will have all your calls on your terminal. It also allows you to make detailed searches. All…