Quantcast
Channel: HACK4NET 🤖 Pentest Tools and News
Browsing latest articles
Browse All 541 View Live

Image may be NSFW.
Clik here to view.

net-creds - Sniff Sensitive Data From Interface or pcap

    Thoroughly sniff passwords and hashes from an interface or pcap file. Concatenates fragmented packets and does not rely on ports for service identification.SniffsURLs visitedPOST loads sentHTTP...

View Article


Image may be NSFW.
Clik here to view.

BLEAH - BLE Scanner for Smart Devices Hacking

     A BLE scanner for “smart” devices hacking based on the bluepy library, dead easy to use because retarded devices should be dead easy to hack.How to InstallInstall bluepy from source:git clone...

View Article


Image may be NSFW.
Clik here to view.

DNSExfiltrator - Data Exfiltration over DNS Request Covert Channel

    DNSExfiltrator allows for transfering (exfiltrate) a file over a DNS request covert channel. This is basically a data leak testing tool allowing to exfiltrate data over a covert...

View Article

Image may be NSFW.
Clik here to view.

Tomb - Minimalistic CLI Tool to Manage Encrypted Volumes

Tomb is an 100% free and open source system for file encryption on GNU/Linux, facilitating the backup of secret files. Tomb is written in code that is easy to review and links commonly shared...

View Article

Image may be NSFW.
Clik here to view.

PCILeech - Direct Memory Access Attack

     The PCILeech use the USB3380 chip in order to read from and write to the memory of a target system. This is achieved by using DMA over PCI Express. No drivers are needed on the target system. The...

View Article


Image may be NSFW.
Clik here to view.

SIMP - System Integrity Management Platform

     The System Integrity Management Platform (SIMP) is an Open Source framework designed around the concept that individuals and organizations should not need to repeat the work of automating the...

View Article

Image may be NSFW.
Clik here to view.

iWant - Decentralized Peer to Peer File Sharing

      A command-line tool for searching and downloading files in LAN network, without any central server.FeaturesDecentralized : There is no central server hosting files. Therefore, no central point of...

View Article

Image may be NSFW.
Clik here to view.

SharpShooter - Payload Generation Framework

   SharpShooter is a payload creation framework for the retrieval and execution of arbitrary CSharp source code. SharpShooter is capable of creating payloads in a variety of formats, including HTA, JS,...

View Article


Image may be NSFW.
Clik here to view.

Wireshark cheatsheet

Wireshark, whose old name is Ethereal; It is a program that can run in many operating systems such as Windows, Linux, MacOS or Solaris and can analyze all the traffic going to network cards connected...

View Article


Image may be NSFW.
Clik here to view.

NSA Releases GHIDRA Source Code — Free Reverse Engineering Tool

NSA today finally released the complete source code for GHIDRA version 9.0.2 which is now available on its Github repository.GHIDRA is agency's home-grown classified software reverse engineering tool...

View Article

Image may be NSFW.
Clik here to view.

DragonBlood – New Vulnerability in WPA3 Protocol Let Hackers To Steal WiFi...

Security researchers discovered a new vulnerability in WPA3 Protocol named as “Dragonblood” allows hackers to steal the WiFi Password from WP3 enabled WiFi Network.This serious vulnerability in WPA3...

View Article

Image may be NSFW.
Clik here to view.

APF - Advanced Policy Firewall

    Advanced Policy Firewall (APF) is an iptables(netfilter) based firewall system designed around the essential needs of today’s Internet deployed servers and the unique needs of custom deployed Linux...

View Article

Image may be NSFW.
Clik here to view.

LFISuite - Totally Automatic LFI Exploiter & Scanner

Totally Automatic LFI Exploiter & Scanner     LFI Suite is a totally automatic tool able to scan and exploit Local File Inclusion vulnerabilities using many different methods of...

View Article


Image may be NSFW.
Clik here to view.

DbDat - Database Assessment Tool

   DbDat performs numerous checks on a database to evaluate security. The categories of checks performed are configuration, privileges, users, and information. Checks are performed by running queries...

View Article

Image may be NSFW.
Clik here to view.

Fast internet-wide scanner - Nscan

Nscan: Fast internet-wide scanner     Nscan is a fast Network scanner optimized for internet-wide scanning purposes and inspired by Masscan and Zmap. It has it’s own tiny TCP/IP stack and uses Raw...

View Article


Image may be NSFW.
Clik here to view.

The Volatility Framework - Volatile Memory Extraction

   The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM)...

View Article

Image may be NSFW.
Clik here to view.

miniLock - Drag-and-Drop Encryption

Drag-and-Drop Encryption miniLock    The encryption project named minilock, is a free and open-source program plugin witch lets anybody encrypt and decrypt files in seconds utilizing drag-and-drop...

View Article


Image may be NSFW.
Clik here to view.

PassGAN - A Deep Learning Approach for Password Guessing

   State-of-the-art password guessing tools, such as HashCat and John the Ripper (JTR), enable users to check billions of passwords per second against password hashes. In addition to straightforward...

View Article

Image may be NSFW.
Clik here to view.

Control IoT devices with thought power using Mindwave headset

What is Electroencephalography (EEG)What is Electroencephalography (EEG)Electroencephalography (EEG) is an electrophysiological monitoring method to record electrical activity of the brain.Mindwave EEG...

View Article

Image may be NSFW.
Clik here to view.

Intel also hacked, private info, sources and tools leaked

It might take a while until further things will be released, while my source makes sure they're safe.  If you find password protected zips in the release the password is probably either "Intel123" or...

View Article

Image may be NSFW.
Clik here to view.

Meet Spox Phishing Kit for carding

What is phishing kit?Phishing kits are generally kits provided by cyber-criminals to allow anyone with a little bit of IT knowledge to carry out a phishing attack. How did i discovered this?During a...

View Article


Image may be NSFW.
Clik here to view.

Fast, multi-platform web server with automatic HTTPS: Caddy

a projectEvery site on HTTPSCaddy is an extensible server platform that uses TLS by default.FeaturesEasy configuration with the CaddyfilePowerful configuration with its native JSON configDynamic...

View Article


Image may be NSFW.
Clik here to view.

Certificate authority and access plane for SSH, Kubernetes, web applications,...

Read our Blog: https://goteleport.com/blog/Read our Documentation: https://goteleport.com/docs/getting-started/Table of ContentsIntroductionInstalling and RunningDockerBuilding TeleportWhy did We Build...

View Article

Image may be NSFW.
Clik here to view.

Free cross-platform password manager compatible with KeePass: Keeweb

 Free cross-platform password manager compatible with KeePassThis webapp is a browser and desktop password manager compatible with KeePass databases. It doesn't require any server or additional...

View Article

Image may be NSFW.
Clik here to view.

A list of useful payloads and bypass for Web Application Security and...

Payloads All The Things A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques !Every section contains the following files, you can...

View Article

Browsing latest articles
Browse All 541 View Live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>