/avatar.png

HackingPassion.com

Hacking is not a hobby but a way of life ♥

Ipdump Generate a Report for Hostname Ip Address Url or Domain

IPDump is a python utility for quickly generating reports for IP Addresses, Websites, and domains. I also show you how to save the terminal output to a file. (The tool is made by bruceybonus01)  Current features Geolocation Information SSL Certificate Fetching WHOIS Information Portscanning  Install 1 sudo git clone https://github.com/bruceybonus01/IPDump.git  1 cd IPDump  1 pip3 install -r requirements.

Install Tor on Windows Kali Linux and Search the Dark Web

What is the Dark Web? In this article and video, I will cover how to install Tor on (Kali) Linux and Windows, explain The Dark Web, What is The Hidden Wiki. The Dos and Don’ts to stay anonymous. Install Deep Explorer to make searching easier on the Deep Web.  The differences between Surface Web, Deep Web, and the Dark Web  What is the Surface Web As you can see in the image, the Surface Web would only consist of 4% of the web.

Install Kali Linux 2020 1 on Virtualbox

In this article and video, I will show you how to install Kali Linux 2020.1 on VirtualBox. Also, install a single boot with Kali Linux. I will cover some big changes that have been made with this new release. “Kali Linux is an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.”  Kali Linux 2020.1 Release On 28 January 2020, Kali has kicked off with the first release of the decade, Kali Linux 2020.

Dark Eagle Tool for Information Gathering and Vulnerability Scanning

DARK EAGLE is an all in one tool for Information Gathering and Vulnerability Scanning written in PHP by NANDYDARK. In the video down below, you can see how to install DARK EAGLE and how this tool is working.  Scans That You Can Perform Using DARK EAGLE Basic Scan Site Title IP Address Web Server Detection CMS Detection Cloudflare Detection robots.txt Scanner Whois Lookup Geo-IP Lookup Grab Banners DNS Lookup Subnet Calculator Nmap Port Scan Sub-Domain Scanner Sub Domain IP Address Reverse IP Lookup & CMS Detection Hostname IP Address CMS Error Based SQLi Scanner HTTP Response Code Site Title Alexa Ranking Domain Authority Page Authority Social Links Extractor Link Grabber WordPress Scan Sensitive Files Crawling Version Detection Version Vulnerability Scanner Crawler Version 2.

Security Webcam Hacking Way Too Easy

Security webcams are often way too easy to hack. In this article + video I show you how this is done. How simple it is to hack a lot of cameras. After many years, it still seems there a few people who are told what is security. Or is it that most people just don’t know what the consequences might be and just ignore the warnings? One of the big ironies of life can be that the devices we create to protect us, can sometimes be used against us.

Windows 7 Reasons to Upgrade to Linux

The end of Windows 7 is rapidly approaching. After January 14, 2020, Microsoft will no longer provide security updates or support for Windows 7..! So what should you do? Buy a new computer with Windows 10? Upgrade the current system to Windows 10 or switch to Linux? I will try to list the pros and “some” cons for you. Why should you upgrade to Linux right away as an ethical hacker.

Blue Eye a Python Recon Toolkit

Blue Eye is a Recon Toolkit script I made in python3. Blue Eye shows the subdomain resolves to the IP addresses, ports and headers, company email addresses and much more ..!  The Blue Eye script shows the: Subdomain resolves to the IP addresses Open Ports HTTP Header Mail Servers DNS Text Records Nameserver Records Sites of interest “email, okta, webmail and slack” Lists of GitHub user pages List of possible company email addresses harvested from GitHub user pages and from DuckDuckGo and Linkedin searches  The Subdomain resolves to the IP addresses.

The best vulnerable websites to improve your hacking skills

Some of the best places to learn ethical hacking. The best vulnerable websites to exercise your hacking skills whether you are a hacker, cybersecurity, pen-tester or still a n00b. These vulnerable websites are great for developing our minds, increasing our capacity to solve problems, new innovative ideas come to our minds. Also, you will face brainfuck a lot of difficulties. Never give up always try to give your best. Because if you want to be a professional hacker, then you must know about the hacker attitudes and …

Shodan Eye Ethical Hacking Tool Release

Shodan Eye Ethical Hacking Tool. Before we start the year 2020, today there is a new big release ..! I am so happy that I have found some inspiration again .. Just at the last minute. Please note, if you have already installed Shodan Eye on your computer, then it is worthwhile to read it carefully. Of course, even if you don’t know this Shodan tool yet.  Shodan Eye Search Engine Shodan Eye collects and returns all information about every device that is directly connected to the internet.

Wi Ploit Wi Fi Exploit Tool

Wi-Ploit is a library of Wi-Fi exploitation tools. Supports the latest other tools e.g: Aircrack-ng etc.  Attacks: Rogue Access Point (hostapd). Rogue Access Point (hostapd-mana). WPS attack (Reaver) * Upcoming. A rogue access point is a wireless access point that has been installed on a secure network without explicit authorization from a local network administrator, whether added by a well-meaning employee or by a malicious attacker.