/avatar.png

HackingPassion.com

Hacking is not a hobby but a way of life ♥

Tentacle a Poc Vulnerability Verification and Exploit Framework

Tentacle is a POC vulnerability verification and exploits framework. It supports a free extension of exploits and uses POC scripts. It supports calls to Zoomeye, Fofa, Shodan, and other APIs to perform bulk vulnerability verification for multiple targets. 

Tentacle is an open-source vulnerability verification and exploits framework that is coded in Python3. It supports easy addition of exploits and even facilitates bulk vulnerability verification across targets using search engines such as Google, Baidu, Bing and internet-connected search engines such as ZoomEye, FOFA, Shodan, etc.

Fsociety Hacking Tools Pack a Mr Robot Penetration Testing Framework

 

fsociety A Penetration Testing Framework, you will have every script that a hacker needs.

fsociety is a penetration testing framework consists of all penetration testing tools that a hacker needs. It includes all the tools involved in the Mr. Robot Series.


 

fsociety is the name of a hacker group based in Coney Island, New York, led by the mysterious Mr. Robot. Its name is a play on both the derelict amusement park building in which it has its headquarters and their message: “f**k society.”

Shodan Command Line a Step by Step Walkthrough

 

Shodan Command line in this article and video, I show you what you can do, and the benefit of using the Shodan command line in your terminal. Searching for Vulnerabilities to port scanning, there is an incredible amount possible with Shodan.


 

What is Shodan

Shodan is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc …) currently connected to the internet using a variety of filters. Some have also described it as a search engine of service banners, which are metadata that the device sends back to the client.

Xspear Powerful Xss Scanner

Xspear is a very powerful XSS scanning and parameter analysis tool on ruby gems, capable of both static and dynamic XSS vulnerability analysis.

In this article and video, I will show you how to install and use Xspear. This awesome tool has the ability to scan, detect and analyze potential XSS vulnerabilities on web applications.


XSpear Powerful XSS Scanner

 

What is (XSS) Cross-site Scripting

XSS is one of the most common hacking technique when it comes to web application vulnerabilities, and occurs when a web app generates an output based on user input.

XCTR Hacking Tools All in One Tool for Information Gathering

XCTR Hacking Tools is a collection of great Tools: Dork Finder, Admin Panel Finder, Cms Finder, Reverse Ip, Page Viewer, and a Proxy Finder A Step-by-Step walkthrough..!


Sometimes you come across a tool that is worth mentioning. XCTR Hacking Tools is one of them. In this article and video, I show you the options and how to install this tool.

This tool is written by Hulya Karabag | Mert Beyoglu
Version 1.0.0 All in one tools for Information Gathering.

Maltrail Malicious Traffic Detection System

 

Maltrail is a Malicious Traffic Detection System that utilizes publicly available blacklists (and other trails from various AV reports and user-defined lists) to help discover unknown threats by monitoring traffic against those lists. Maltrail is run from the command line but does include a handy (and optional) web interface.

If you take the security of your servers and computers really seriously, then you know how important it is to be constantly alert to malicious behavior. This can be a 24/7/365 job, and if you have a lot of equipment, this task is almost impossible. Fortunately, there are a number of useful tools available that reduce this burden considerably. Such a tool is Maltrail.

How to Hack and Exploit Printers in Seconds

 

A Step-by-Step walkthrough..! In this article and video, I will show you how to hack and exploit printers. How easy it is to hack, how to get full control, capture, and start sending documents our way. So all future print jobs that are going to come across the printer we’ve connected to which are going to start spooling over.


 

Why I chose to show you this

Again… I chose to show you this, because it is so incredibly easy to hack printers, and through this hack to get further in systems and can cause incredible damage. Secret documents or whatever.
Here you can find the post about the Security Webcam Hacking As you see this is also incredibly simple to hack.

How to Install Windows 10 on Virtualbox

 

Windows is a common operating system used by billions of people. And because of that, there are always many vulnerabilities on Windows.
Because in the future I will use, show and exploit a lot of those vulnerabilities, Therefore I think it is necessary to show the setup of Windows in VirtualBox.

For beginners, but also for advanced people who like to watch and discover maybe something new.

“Difference between a virus and windows? Viruses rarely fail.”

Ipdump Generate a Report for Hostname Ip Address Url or Domain

IPDump is a python utility for quickly generating reports for IP Addresses, Websites, and domains. I also show you how to save the terminal output to a file. (The tool is made by bruceybonus01)


 

Current features

  • Geolocation Information
  • SSL Certificate Fetching
  • WHOIS Information
  • Portscanning

 

Install

1
sudo git clone https://github.com/bruceybonus01/IPDump.git

 

1
cd IPDump

 

1
pip3 install -r requirements.txt

 

1
python3 ipdump.py -h

Install IPDump

 

Install Tor on Windows Kali Linux and Search the Dark Web


What is the Dark Web? In this article and video, I will cover how to install Tor on (Kali) Linux and Windows, explain The Dark Web, What is The Hidden Wiki. The Dos and Don’ts to stay anonymous. Install Deep Explorer to make searching easier on the Deep Web.


 

The differences between Surface Web, Deep Web, and the Dark Web


The differences between Surface Web, Deep Web, and the Dark Web