Wifite 2.1.0 – Automated Wireless Attack Tool

0

A complete re-write of wifite, a Python script for auditing wireless networks. Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches! What's new in Wifite 2.1.0? Less bugs Cleaner process management. Does not leave processes running in the background (the old wifite was bad about this). No longer "one monolithic script". Has working unit tests. Pull requests...

Autovpn – Connect to a VPN in a Country of your Choice

0

AutoVpn is a tool to automatically connect you to a random VPN in a country of your choice. It uses openvpn to connect you to a server obtained from VPN Gate. Compiling Autovpn First clone the repo and cd into the directory: $ git clone https://github.com/adtac/autovpn $ cd autovpn Then run this to generate the executable: $ go build autovpn.go Also Read BurpBounty - Active and Passive...

BurpBounty – Active and Passive Scan Check Builder

0

BurpBounty permits you, in a speedy and basic way, to enhance the active and passive burpbounty suite scanner by methods for customized rules through an exceptionally natural graphical interface. Through a propelled pursuit of examples and a change of the payload to send, we can make our own particular issue profiles both in the active scanner and in the...

THC-SSL-DOS – DoS Tool Against Secure Web-Servers and for Testing SSL-Renegotiation

0

THC is The Hacker's Choice. They are a group of hackers from Germany. Thc-SSL-dos is used for checking whether a website or server is enabled with SSL-renegotiation, thereby checking for renegotiation vulnerability (CVE-2009-3555). SSL renegotiation is the process of renegotiating a client at the time of authentication. This tools sends SSL requests(Client Hello) to a webserver & then rejects the...

ReverseAPK – Quickly Analyze And Reverse Engineer Android Applications

0

Now and then, you may have a circumstance to figure out your current APKs for legitimate analysis investigation reasons, for example, making queries on the application source for getting more inside data. ReverseAPK will quickly analyze and reverse engineer android applications. Also Read Best Hacking Books, Tools & Resources 2018 ReverseAPK FEATURES: Displays all extracted files for easy reference Automatically decompile APK...

Best Hacking Books, Tools & Resources 2018

0

The mystery of turning into a superior infiltration analyzer, bug abundance seeker or IT proficient is to center around pentesting books as well as read the best hacking books that related subjects, for example, Networking, programming, abuse improvement, web applications, arrange security checking and other IT subjects. A curated rundown of amazing Hacking books, tools, and resources. Also Read SocialFish To...

Best Free Hacking Books PDF Related To Security and Pentesting

0

E-books security is an articulation that was made when the term digital book was first utilized, possibly around 1999. Here is the list of free Hacking Books PDF. Today it can be hard to perceive any distinction between the two, despite the fact that Adobe and Amazon may be the greatest clients of the term until the point when Adobe...

Cangibrina Tool To Obtain Dashboard Of Sites Using Brute-Force

0

Cangibrina is a multi platform apparatus which means to acquire the Dashboard of sites utilizing brute-force over wordlist, google, nmap, and robots.txt. A quick and powerfull dashboard (administrator) finder. It encourages you disguise your IP deliver by enabling you to examine utilizing the TOR network. The web index it influences are Google and DuckDuckGo. It can likewise enable you to...

SocialFish To Easily And Quickly Create Phishing Sites

0

Ultimate phishing tool with Ngrok integrated. Using this tool anyone can easily and quickly create a phishing sites. The utilization of the SocialFish is COMPLETE RESPONSIBILITY of the END-USER. Engineers expect NO risk and are NOT in charge of any abuse or harm caused by this program. Also Read Wifiphisher Can Attack Wi-Fi By Unknowingly Connecting To An Attacker-Controlled Access Point Prerequisites For SocialFish ...

Wifiphisher Can Attack Wi-Fi By Unknowingly Connecting To An Attacker-Controlled Access Point

0

Wifiphisher is a security device that performs Wi-Fi programmed affiliation attack to drive wireless customers to unwittingly interface with an attacker-controlled Access Point. It is a maverick Access Point system that can be utilized to mount robotized casualty altered phishing assaults against WiFi customers keeping in mind the end goal to acquire qualifications or taint the casualties with malwares. It...