Quantcast
Channel: HACK4NET 🤖 Pentest Tools and News
Browsing all 541 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

Shadow Brokers leak trove of NSA hacking tools

The tools were dumped via the Shadow Brokers Twitter account and were accompanied by a blog post, as the group did in the past.Called "Lost in Translation," the blog post contains the usual...

View Article


Image may be NSFW.
Clik here to view.

Cam4 Brute Force - python based tool

Step 1: Get fresh proxylist using proxi.pyStep2: Make a combolist with accounts that you want (user:pass)Step3: Run bru.pyScreenshot:GITHUB PROJECT

View Article


Image may be NSFW.
Clik here to view.

ShodanHat - Search For Hosts Info With Shodan

Search For Hosts Info With Shodan.DependenciesYou need to install shodan with pip install shodan or easy_install shodan.You need to install python-nmap with pip install python-nmap.You need to set your...

View Article

Image may be NSFW.
Clik here to view.

Wifiphiser v1.3 – Fast automated phishing attack against WPA networks.

Wifiphisher is a security tool that mounts fast automated phishing attacks against WPA networks in order to obtain the secret passphrase. It is a social engineering attack that unlike other methods it...

View Article

Image may be NSFW.
Clik here to view.

DAMM – Differential Analysis of Malware in Memory.

DAMM is An open source memory analysis tool built on top of Volatility. It is meant as a proving ground for interesting new techniques to be made available to the community. These techniques are an...

View Article


Image may be NSFW.
Clik here to view.

BeRoot - Privilege Escalation for Windows

BeRootBeRoot(s) is a post exploitation tool to check commun Windows misconfigurations to find a way to escalate our privilege.A compiled version is available here.It will be added to the pupy project...

View Article

Image may be NSFW.
Clik here to view.

How to be low-level programmer?

What is it?I'm inspired by google-interview-university. I'd like to share my experience and show a roadmap to becoming a low-level programmer because I have found that these skills are not as common as...

View Article

Image may be NSFW.
Clik here to view.

Windows Remote Administration Tool via Telegram

RAT-via-TelegramWindows Remote Administration Tool via TelegramWhy another one?The current Remote Administration Tools in the market face 2 major problems:Lack of encryption.Require port forwarding in...

View Article


Image may be NSFW.
Clik here to view.

How to Make Your Own Pirate Radio Station

Project StepsMake the antenna.Flash the SD card and add music.Edit the config file.Start it up!How the PiFM software works.Going further.Parts:Raspberry Pi single-board computer from the Raspberry Pi...

View Article


Image may be NSFW.
Clik here to view.

Make a Teeny Tiny FM Spy Transmitter

This project describes how to build an audio spy bug with extremely small dimensions that works with a voltage of only 1.5V. This is a tested design and proven to be working reliably when built as...

View Article

Image may be NSFW.
Clik here to view.

BrainDamage - Backdoor via Telegram as a C&C Server

A python based backdoor which uses Telegram as C&C server.For Windows Only--> Persistance--> USB spreading--> Port Scanner--> Router Finder--> Run shell commands-->...

View Article

Image may be NSFW.
Clik here to view.

Ares - Python Based Botnet and Backdoor

Ares is made of two main programs:A Command aNd Control server, which is a Web interface to administer the agentsAn agent program, which is run on the compromised host, and ensures communication with...

View Article

Image may be NSFW.
Clik here to view.

EgeSploit - golang library for malware development

EGESPLOIT is a golang library for malware development, it has few unique functions for meterpreter integration.#DOCUMENTATION CalculateChecksum(x) : Function calculates x digit 8 bit checksum for...

View Article


Image may be NSFW.
Clik here to view.

Needle - The iOS Security Testing Framework

Needle is an open source, modular framework to streamline the process of conducting security assessments of iOS apps.Assessing the security of an iOS application typically requires a plethora of tools,...

View Article

Image may be NSFW.
Clik here to view.

Open Source Phishing Toolkit

Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness...

View Article


Image may be NSFW.
Clik here to view.

King Phisher - Phishing Campaign Toolkit

InstallationFor instructions on how to install, please see the INSTALL.md file. After installing, for instructions on how to get started please see the wiki.King Phisher is a tool for testing and...

View Article

Image may be NSFW.
Clik here to view.

Beware! Dozens of Linksys Wi-Fi Router Models Vulnerable to Multiple Flaws

Bad news for consumers with Linksys routers: Cybersecurity researchers have disclosed the existence of nearly a dozen of unpatched security flaws in Linksys routers, affecting 25 different Linksys...

View Article


Image may be NSFW.
Clik here to view.

TaBi - Track BGP Hijacks

Developed since 2011 for the needs of the French Internet Resilience Observatory, TaBi is a framework that ease the detection of BGP IP prefixes conflicts, and their classification into BGP hijacking...

View Article

Image may be NSFW.
Clik here to view.

Truehunter - Tool to detect TrueCrypt containers

The goal of Truehunter is to detect TrueCrypt containers using a fast and memory efficient approach. It was designed as a PoC some time ago as I couldn't find any open source tool with the same...

View Article

Image may be NSFW.
Clik here to view.

Belgium bans anonymous prepaid mobile phone SIM cards

A new anti-terror law in Belgium aims to make it impossible for people to buy pay-as-you-go mobile phone SIM cards anonymously.The measure will be enforced in the autumn and comes as part of the...

View Article
Browsing all 541 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>