Passwordless Authentication Should Become Mainstream by 2023
Since the days of Ancient Rome and Egypt, people have used passwords to authenticate and grant access. Nowadays, passwords are more common than ever. From Netflix to Amazon and all the other online platforms, the average person has 90 online accounts. To save time and make login credentials easier to remember, most people recycle passwords across accounts. That is,...
Email2PhoneNumber: Obtain Phone Number via Email Address
Introduction An open-source intelligence (OSINT) tool called Email2PhoneNumber enables you to discover a target's phone number simply by knowing his email address. Basic usage information By exploiting the password reset email design flaws and publicly available data, this crude tool assists in automating finding someone's phone number. It supports 3 primary functions: “scrape” — scrapes websites for phone number digits by initiating password...
SOC-Multitool
Introduction Introducing SOC Multitool a free and open-source browser extension that accelerates and optimizes research. Now accessible through the Chrome Web Store and working with every browser powered by the Chromium OS, including Microsoft Edge, Chrome, Brave, and Opera. Download link- https://chrome.google.com/webstore/detail/soc-multi-tool/diagjgnagmnjdfnfcciocmjcllacgkab?hl=en&authuser=0 Streamline your investigations The constant copying and pasting required during investigations is done away with by SOC Multi-Tool. To access the type...
KubeStalk : Discovers Kubernetes Attack Surface From A Black-Box Perspective
KubeStalk is a tool to discover Kubernetes and related infrastructure based attack surface from a black-box perspective. This tool is a community version of the tool used to probe for unsecured Kubernetes clusters around the internet during Project Resonance - Wave 9. Usage The GIF below demonstrates usage of the tool: Installation KubeStalk is written in Python and requires the requests library. To install...
kalipak
Kali Metapackage CLI Use this script if you want access to Kali Metapackage on your current Linux distribution but do not want to install the entire Kali distribution. Debian is being used at the moment. A few problems exist with Ubuntu. Be careful when using this script. What is a meta package? Metapackages, which are created as a list of dependencies on...
LazyBox
What is LazyBox? For infosec professionals to quickly set up a good testing environment, a LazyBox has been developed. The majority of the required libraries, drivers, and tools are present in this box. Tools BruteList Arjun dirsearch gobuster JSParser knockpy Autocon the_s3_bucketers wpscan Massdns lazys3 Tidos-frame-work virtual-host-discovery lazy-recon LinkFinder Asn Lookup Photon Httprobe Unfurl Wayback Urls crtndstry XSS striker Installing Git git clone https://github.com/arhaxor21/lazybox.git cd lazybox/ chmod +x lazybox.sh ./lazybox.sh Licensing Lazybox is licensed under the GNU General Public License. Please consider following and supporting us to stay updated with the latest info
P-Gen
About Tool: The Python-based P-gen tool generates random passwords in a matter of milliseconds. This tool is compatible with both rooted and non-rooted Android devices. Available ON : Termux TESTED ON: Termux REQUIREMENTS : Internet storage 200 MB FEATURES : Stable tool! Updated maintenance! Best in termux! Easy for Beginners! INSTALLATION : apt-get update -y apt-get upgrade -y pkg install python -y pkg install python2 -y pkg install git -y pip install lolcat pip install requests pip install random git clone...
Cracking the User Credentials using the John the Ripper
I am going to demonstrate two ways in which we will crack the user credentials using John the Ripper. So, before diving in, we need to know what a shadow file is. A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is accessible only to the root user, preventing unauthorized...
Top 5 popular Web Scanner for Kali Linux
Here are five well-known Web Scanner for Kali Linux, along with their brief descriptions, installation, and usage examples: Kali Linux is a popular distribution for penetration testing and ethical hacking, and it comes with a wide range of tools for web application scanning. 1. Nikto: Nikto is a powerful web server scanner that identifies potential vulnerabilities and misconfigurations in web servers. Installation:sudo apt...
007-TheBond
Information about the Script Finding information about your friends, family, enemies, and the crush who will not talk to you is made possible by the 007-TheBond OSNIT Script. Features Instagram OSINT Phone number OSINT Search for a Username on Social Media Search the web IplookUp Disclaimer By using the script, you agree that you are responsible for any losses you incur and that DeadShot0x7 will have no liability...