Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release

Ghost Eye New Release. Ghost Eye is an Information Gathering, Footprinting, Scanner, and Recon Tool I made in Python 3. Since the last release of Ghost Eye, I’ve tweaked, removed, and added some new features. So that Ghost Eye would become more of a whole. For me, it remains a game of options so that together you get a complete overview of your target.   Ghost Eye Options  In the previous version of Ghost Eye, one of the the option was, “Have I been pwned” Since you need here now (a paid API) for this, I have removed this tool.

mosint An automated email OSINT tool

MOSINT is an OSINT Tool for emails. It helps you gather information about the target email. This is such as telephone numbers, data leaks, related domain names and much more.  Information Gathering Information Gathering is the act of gathering different kinds of information against the targeted victim or system. There are various tools, techniques, and websites, including public sources such as Whois, nslookup that can help gather information.

Maigret OSINT Username Checker

The Purpose of Maigret - collect a dossier on a person by username only, checking for accounts on a huge number of sites. This is a sherlock fork with cool features under heavy development. Don’t forget to regularly update source code from this repo. Currently supported more than 2000 sites (full list), by default the search is launched against 500 popular sites in descending order of popularity.     The Commissioner Jules Maigret is a fictional French police detective, created by Georges Simenon.

Glances System Monitor Tool an Eye on Your System

Glances is a cross-platform system monitoring tool written in Python. It shows a frequently updated list of the processes running on a computer, normally ordered by the amount of CPU usage. It’ll run on almost any platform, including Linux, Windows, and macOS. This tool makes it easier for developers to view a large amount of monitoring information through a web-based interface. Many of you know Top as a monitor tool, or Htop, a slightly more extensive version of Top.

Wildcards Understanding and Using for Hacking

Wildcards, I would like to highlight the use of Wildcards, because they are incredibly important, especially for “hacking-related and some programming” stuff. In this article I will cover one interesting old-school Unix hacking technique, that will still work nowadays in 2020. In real-world attacks, arbitrary shell options and or arguments could be hidden among regular files, and not so easily spotted by the administrator. Same in case of cron jobs, shell scripts or web applications that calls shell commands.

How to Hack Exploit Windows Using Metasploit Beginners Guide

For this video - article, I set up Windows 7 (As an easy target). Create a payload with Metasploit MSFvenom and get full control over the target machine using Metasploit MSFConsole. And then we going to have some fun. I like to mention, that these commands I use in this tutorial are the same and it does not matter wetter you use Kali Linux or Parrot Security OS. All commands are the same.

Create bootable (USB) Drive fast

Download ISO with WGET or Curl and put this directly to your (USB) to make a bootable Drive - Simple and Fast. As you might know, personally I like to keep things as simple as possible, and fast as well. You can use these techniques with all types of files. But for this article, I like to show you how to make a bootable USB. That means you can boot your system from the USB or your Device.

Install Anarchy Linux for Penetration Testing and Ethical Hacking

Anarchy is an install script for Arch Linux. We going to set up VirtualBox and install Anarchy, then install the BlackArch repository so we can install all the BlackArch tools we like. The BlackArch repository contains 2572 Ethical Hacking and penetration tools. More as on Kali Linux and Parrot Security together. BlackArch is constantly being updated and offers the latest packages available on GitHub. The Anarchy Installer provides quick access to multiple desktop environments and custom configurations.

Learn Linux Through Man Pages

How cool would it be to learn Linux through the man pages To make it even more fun, I made this script with various options and with a cool retro terminal. I recommend watching the video so you can see the install the various options, how you can adjust this script to your own needs, and some other cool things. Old Fashioned Linux Somehow the man pages always remind me a bit of the past, to old school.

My Complete Atom Setup Tutorial

I will show you the most valuable packages for me. And I show you how to install Atom Atom is the IDE developed by GitHub and it is completely hackable which means you can customize it as you want. I use Atom for programming for more than two years. A “hackable text editor for the 21st century” Since I have just installed my default laptop again with Parrot Security OS, one of the first things I always do is install an IDE (Integrated Development Environment) or text editor.