Information / Intelligence Gathering.
This post is going to be about information gathering. Its one of the important things. You want to know what you are going up against.
Information about location, building, and etc...
Google Maps and Google streets.(1)
Local government office might have...
Carding Authorization [Tutorial]
Hi friends,
How are u today ? Hope ur all fine & happy.
Alright, I would like to share little tips on how to card something so that u can do it successfully. Well, our hope is the item u carded can be delivered to ur drop address "safely" (from ur point of...
1.Choose something you want to buy something from Amazon. Let's
say you want a digital camera, add one to your cart.
2. Now, when you have selected whatever you want (I recommend 1
to 3 items) go and search for ink or nail polish.
3. Now, add the ink or nail polish into your cart.
4. Now, you...
Java Deserialization Exploit is a tool that allows you to get a remote shell on vulnerable Linux machines.
It exploits a Java deserialization vulnerability using the Metasploit framework to generate a malicious file and an embedded web server to transfer payloads to the victim side.
The...
iFi-Pumpkin is a very complete framework for auditing Wi-Fi security. The main feature is the ability to create a fake AP and make Man In The Middle attack, but the list of features is quite broad.
DOWNLOAD WIFI-PUMPKIN
Installation
Python 2.7
Code:
or download .deb file to install
Code...
The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own risks.
DMCA take down cannot be possible as we are not republishing the books/infringement of code, but we are just...
Captain brute is a all in one hacking tool by John Modica CybernetiX-S3C it writing in bash with wide range of tools like phishing attacks ddos information gathering and much more
To download open terminal and type git clone
https://github.com/Hackingvisionofficial/Captain-Brute.git
or...
There a lot hype about Termux in the hacking world so i though was only fair to add a post on the top tools to install on termux
So that is termux?
Termux turns a Android device into a lightweight and versatile Linux environment. … The app requires no root privileges, and the dedicated...
A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks.
Install
Usage
Configure
Running both components Set up variables in config.env:
NOBLE_HCI_DEVICE_ID : noble (“central”, ws-slave) device
BLENO_HCI_DEVICE_ID : bleno...
Scan Google (or other) search results for vulnerabilities.
dorkbot is a modular command-line tool for performing vulnerability scans against sets of webpages returned by Google search queries or other supported sources. It is broken up into two sets of modules:
Indexers - modules that return a...
OWASP Passfault evaluates passwords and enforces password policy in a completely different way. https://passfault-hrd.appspot.com
Running the Command-line Interface:
install java 8 jdk
cd core
../gradlew installDist
run build/install/core/bin/core
Running the jsonWebService:
cd jsonService...
Hello carders are you feeling hungry? Well, you’re in luck because in this latest article/tutorial we will be discussing how you can order a pizza from Dominos using a CC with just enough balance to cover your order in 2022.
Strange enough it will work for lazy carders as well as there is no...
Recently i have worked with Mozilla Firefox 4 and advanced version 5. It is annoying me. The following does not supported by advanced version of Firefox .
Internet Download Manager Plugin. My favorite downloading software is supported by mozilla firefox. What the hell is it? But i fix this...
Hi Break The Security hackers, this is just screen shot. The Detailed Text version tutorial can be found in this link:
How to hack Windows accounts Password with Ophcrack?
I have separated it into two parts because of too large number of Screen shots.
Disclaimer:
The sole aim of this article is to disclose the truth behind carding to the general public. Therefore, every reader is responsible for the consequences of indulging in the carding format.
History of Carding
The origin of carding is in the U.S. in the 1980s, during which the BBSes...