Tentacle is a POC vulnerability verification and exploits framework. It supports a free extension of exploits and uses POC scripts. It supports calls to Zoomeye, Fofa, Shodan, and other APIs to perform bulk vulnerability verification for multiple targets. Tentacle is an open-source vulnerability verification and exploits framework that is coded in Python3. It supports easy addition of exploits and even facilitates bulk vulnerability verification across targets using search engines such as Google, Baidu, Bing and internet-connected search engines such as ZoomEye, FOFA, Shodan, etc.
fsociety A Penetration Testing Framework, you will have every script that a hacker needs. fsociety is a penetration testing framework consists of all penetration testing tools that a hacker needs. It includes all the tools involved in the Mr. Robot Series. fsociety is the name of a hacker group based in Coney Island, New York, led by the mysterious Mr. Robot. Its name is a play on both the derelict amusement park building in which it has its headquarters and their message: “f**k society.
Shodan Command line in this article and video, I show you what you can do, and the benefit of using the Shodan command line in your terminal. Searching for Vulnerabilities to port scanning, there is an incredible amount possible with Shodan. What is Shodan Shodan is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc …) currently connected to the internet using a variety of filters.
Xspear is a very powerful XSS scanning and parameter analysis tool on ruby gems, capable of both static and dynamic XSS vulnerability analysis. In this article and video, I will show you how to install and use Xspear. This awesome tool has the ability to scan, detect and analyze potential XSS vulnerabilities on web applications. What is (XSS) Cross-site Scripting XSS is one of the most common hacking technique when it comes to web application vulnerabilities, and occurs when a web app generates an output based on user input.
XCTR Hacking Tools is a collection of great Tools: Dork Finder, Admin Panel Finder, Cms Finder, Reverse Ip, Page Viewer, and a Proxy Finder A Step-by-Step walkthrough..! Sometimes you come across a tool that is worth mentioning. XCTR Hacking Tools is one of them. In this article and video, I show you the options and how to install this tool. This tool is written by Hulya Karabag | Mert Beyoglu
Maltrail is a Malicious Traffic Detection System that utilizes publicly available blacklists (and other trails from various AV reports and user-defined lists) to help discover unknown threats by monitoring traffic against those lists. Maltrail is run from the command line but does include a handy (and optional) web interface. If you take the security of your servers and computers really seriously, then you know how important it is to be constantly alert to malicious behavior.
A Step-by-Step walkthrough..! In this article and video, I will show you how to hack and exploit printers. How easy it is to hack, how to get full control, capture, and start sending documents our way. So all future print jobs that are going to come across the printer we’ve connected to which are going to start spooling over. Why I chose to show you this Again… I chose to show you this, because it is so incredibly easy to hack printers, and through this hack to get further in systems and can cause incredible damage.
Windows is a common operating system used by billions of people. And because of that, there are always many vulnerabilities on Windows. Because in the future I will use, show and exploit a lot of those vulnerabilities, Therefore I think it is necessary to show the setup of Windows in VirtualBox. For beginners, but also for advanced people who like to watch and discover maybe something new. “Difference between a virus and windows?
IPDump is a python utility for quickly generating reports for IP Addresses, Websites, and domains. I also show you how to save the terminal output to a file. (The tool is made by bruceybonus01) Current features Geolocation Information SSL Certificate Fetching WHOIS Information Portscanning Install 1 sudo git clone https://github.com/bruceybonus01/IPDump.git 1 cd IPDump 1 pip3 install -r requirements.txt 1 python3 ipdump.py -h Usage Help Menu 1 python3 ipdump.py -h 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 usage: ipdump.
What is the Dark Web? In this article and video, I will cover how to install Tor on (Kali) Linux and Windows, explain The Dark Web, What is The Hidden Wiki. The Dos and Don’ts to stay anonymous. Install Deep Explorer to make searching easier on the Deep Web. The differences between Surface Web, Deep Web, and the Dark Web What is the Surface Web As you can see in the image, the Surface Web would only consist of 4% of the web.