Mastering WificraK – Unveiling the Power of Advanced Wi-Fi Exploits

Introduction The majority of WPA2-PSK and WEP encryption attacks can be carried out using the WificraK tool. Using crunch or a wordlist, the tool enables you to open previously captured files. The tool has been tested on Kali Linux and Parrot OS. Attacks Usage To start wificraK, you need to be root and then start …

WcamPhish – Unauthorized Remote Camera Access via Link

Introduction WcamPhish is a method for capturing images of a target’s webcam or front camera on a phone. In order to create a link that we can send to the target over the internet, WcamPhish hosts a fake website on a PHP server that was custom-built. If the target agrees, the website requests their camera …

Shaco – C linux agent for the Havoc framework

Shaco Shaco is a simple C Linux agent for the Havoc framework, available at https://github.com/HavocFramework/Havoc. Utilizing a hardcoded socket, Shaco communicates with the server over HTTP. Commands This is the list of commands that the agent supports: Features Features of Shaco agent Running and Configuration/Compilation Clone git clone –recurse-submodules https://github.com/souzomain/Shaco.git  After cloning this repo, you …

TRY HARDER: A Cybersecurity Retro Game for OSCP Preparation

Table of Contents Introduction “Try Harder” is a cybersecurity retro game created by Milosilo. It offers an immersive experience and a retro aesthetic while simulating 100 actual scenarios to aid in your exam preparation for the Offensive Security Certified Professional (OSCP). Gain a point by correctly executing real commands and moving on to the next …

Impulse Denial-of-service ToolKit

Modern Denial-of-service ToolKit Main Window Methods-  Method Target Description SMS PHONE Sends a massive amount of SMS messages and calls to a single target EMAIL EMAIL Sends a massive amount of Email messages to a target NTP IP:PORT A SYN flood (half-open attack) is a type of denial-of-service (DDoS) attack that aims to make a …

Vid2img-extract all frame from a given video

Introduction to Vid2img Tool: A script written in Python called the vid2img tool can extract every frame from a given video. Any device with Python installed can use this tool Installation vid2img tool (python 3) sudo apt-get update -y && sudo apt-get upgrade -y sudo apt install git python3 -y git clone https://github.com/turbo-hackers/Vid2img.git cd Vid2img …

404 Frame – Infiltrating websites is now easy

What is a 404 Frame? Most tools for hacking a website are found in the 404 Frame. In this way, no time is wasted! We wanted to give 404 Frame a unique terminal feel since most software does not have one. So what exactly are the commands? You can issue orders using everyday conversational language …

jupyter-kali

Introduction A Kali-based container for recon and enumeration using JupyterLab hosted on Docker. Jupyter Notebook is an open-source web application that allows you to create and share documents that contain live code, equations, visualizations, and narrative text. Uses include data cleaning and transformation, numerical simulation, statistical modeling, data visualization, machine learning, and much more. Example …

Email2PhoneNumber: Obtain Phone Number via Email Address

Introduction  An open-source intelligence (OSINT) tool called Email2PhoneNumber enables you to discover a target’s phone number simply by knowing his email address. Basic usage information By exploiting the password reset email design flaws and publicly available data, this crude tool assists in automating finding someone’s phone number. It supports 3 primary functions: Requirements pip3 install …

SOC-Multitool

Introduction Introducing SOC Multitool a free and open-source browser extension that accelerates and optimizes research.  Now accessible through the Chrome Web Store and working with every browser powered by the Chromium OS, including Microsoft Edge, Chrome, Brave, and Opera. Download link- https://chrome.google.com/webstore/detail/soc-multi-tool/diagjgnagmnjdfnfcciocmjcllacgkab?hl=en&authuser=0  Streamline your investigations The constant copying and pasting required during investigations is done …