A good stock of CVV2’s
Plenty of SIM cards
Internet Access
Mobile phone – Iphone 2G recommended
Step 1: How to find a sms-wmz exchanger
Google is your best friend! Keep repeating that phrase. You will be using it extensively so make sure you treat it well. Use obvious phrases such as...
Creating great content is the first half of success in content marketing. Getting quality content read by, and amplified to, a relevant audience is the oft overlooked second half of success. Facebook can be a content marketer's best friend for this challenge. For reach, relevance and...
Miteru is an experimental phishing kit detection tool.
How it works
It collects phishy URLs from the following feeds:
CertStream-Suspicious feed via urlscan.io
OpenPhish feed via urlscan.io
PhishTank feed via urlscan.io
Ayashige feed
It checks each phishy URL whether it enables directory...
Hey all together! I think it's a nice tutorial and i learned much from it.
How To Crack Programs Yourself
A lot of times I've seen and heard arrogant people claiming that they are hacker and they can crack programs. OK, cracking a software is VERY easy if use a patcher released by...
!WARNING!A lot of teens take pornographic images of themself or their friends and since if they they are under age it's CP, and it is illegal to distribute such pics. For that reason and because most teen girls that do this only want their boyfriend to see (not the general public), they will...
Introduction
So you want to be a white hat hacker? Get paid six figures to break into computers,networks,web applications, and be completely legal? Do you want get paid to take security courses, attend conferences, expand your knowledge and work with some of the best minds in Information...
Cryptors, a cyber security company, invented a mobile app called HACKUNA (Anti-Hack) that can block and detect these WiFi hackers. The exciting part here is, you can also track the hackers within the area. It will give you all the details you need to find the hacker within the area or to report...
Vulmap is an open source online local vulnerability scanner project. It consists of online local vulnerability scanning programs for Windows and Linux operating systems.
These scripts can be used for defensive and offensive purposes. It is possible to make vulnerability assessments using these...
This tools is continued from Nefix, DirsPy and Xmasspy project.
Installation
Will work fine in the debian shade operating system, like Backbox, Ubuntu or Kali linux.
Features
Extract mikrotik credential (user.dat)
Password generator
Reverse IP lookup
Mac address sniffer
Online md5 cracker...
By default any user in Active Directory can enumerate all DNS records in the Domain or Forest DNS zones, similar to a zone transfer. This tool enablesenumeration and exporting of all DNS records in the zone for recon purposes of internal networks.
For more info, read the associated blog post...
The Kostebek is a reconnaissance tool which uses firms' trademark information to discover their domains.
Installation
Tested on Kali Linux 2018.2, Ubuntu 16.04
Download latest version of Chrome
https://www.google.com/chrome/browser/desktop/
dpkg -i google-chrome-stable_current_amd64.deb...
Credmap is an open source credential mapper tool that was created to bring awareness to the dangers of credential reuse. It is capable of testing supplied user credentials on several known websites to test if the password has been reused on any of these.
It is not uncommon for people who...
Cangibrina is a Python-based multi platform admin dashboard finder tool which aims to obtain the location of website dashboards by using brute-force, wordlists, Google, Nmap and robots.txt.
It is multi-threaded, supports modifying your user agent, using a TOR proxy, custom dorks, Nmap...
Description
BLACKEYE is an upgrade from original ShellPhish Tool (https://github.com/thelinuxchoice/shellphish) by thelinuxchoice under GNU LICENSE. It is the most complete Phishing Tool, with 32 templates +1 customizable. WARNING: IT ONLY WORKS ON LAN! This tool was made for educational...
This exploit takes advantage of a use after free vulnerability in Google Chrome 72.0.3626.119 running on Windows 7 x86. The FileReader.readAsArrayBuffer function can return multiple references to the same ArrayBuffer object, which can be freed and overwritten with sprayed objects. The dangling...
A terminal user-interface for tshark, inspired by Wireshark.
If you're debugging on a remote machine with a large pcap and no desire to scp it back to your desktop, termshark can help!
Features
Read pcap files or sniff live interfaces (where tshark is permitted).
Inspect each packet using...
BruteDum is a SSH, FTP, Telnet, PostgreSQL, RDP, VNC brute forcing tool with Hydra, Medusa and Ncrack. BruteDum can work with aany Linux distros if they have Python 3.
Features of BruteDum
SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra (recommended)
SSH, FTP, Telnet, PostgreSQL, RDP, VNC...
CQURE Team has prepared tools used during penetration testing and packed those in a toolkit named CQTools. This toolkit allows to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom...
Recon-Tool made for reconnaissance and information gathering with an emphasis on simplicity.
It will do everything from.
Features
Information Security Headers
WAF Detector
Banner Grabbing
Phone Number
Credit Card Number
Email
US Social Security Number
Url Crawl
Dom Paramter Url
Internal...
Tool to find and extract credentials from phone configuration files in environments managed by Cisco's CUCM (Call Manager).
When using Cisco's CUCM (Call Manager), phone configuration files are stored on a TFTP server. These phone configuration files quite frequently contain sensitive data...