Termo-Kali : A Guide To Installing Kali Linux On Android via Termux
Termo-Kali bridges the gap between powerful Linux capabilities and the convenience of mobile devices by bringing Kali Linux to Android through Termux. This guide provides a step-by-step walkthrough for installing Termo-Kali, allowing users to harness a full-fledged Linux environment on their Android smartphones. Start exploring the possibilities of mobile penetration testing and security tasks today with Termo-Kali. PRIMARY INSTALLATION $ pkg...
Certified Ethical Hacker Quiz – Sharpen Your Skills With The CEH v12 Interactive Application
Welcome to the Ethical Hacking Quiz Application, designed to help learners test their knowledge of the Certified Ethical Hacker v12 curriculum. This CLI-based tool offers an interactive way to engage with ethical hacking concepts and prepare for CEH v12 certification exam. Features Dynamic Question Pool: Questions are fetched dynamically from a remote source, ensuring a varied and up-to-date quiz each time...
WPA2 Handshake Automation Tool – A Quick Guide
The WPA2 Handshake Automation Tool is a Python3 script designed to simplify the process of setting up and capturing WPA2 handshakes. Whether you're testing your own network security or conducting ethical hacking, this tool streamlines the steps required to capture WPA2 handshakes. Features Quick setup for making and capturing WPA2 handshakes Requires a WIFI card that supports Monitor mode and Packet injection Works on Linux...
Star-Tup : A Beginner’s Guide To Bash Scripting For Productivity
A custom bash script designed to streamline your startup process and enhance your scripting skills. Originally crafted for personal use and shared for community benefit, this tool is perfect for Linux enthusiasts seeking efficiency. Whether you're setting up your environment or skipping system updates, "star-tup" offers a practical solution to customize and optimize your Linux experience. ...
Cybersecurity Toolkit – Essential Python Tools For Penetration Testing
Welcome to the Cybersecurity Toolkit, a collection of essential Python tools designed for penetration testing enthusiasts. In this article, we delve into a range of powerful yet straightforward scripts crafted for educational purposes. From port scanning to password sniffing and encryption, each tool offers insight into cybersecurity fundamentals and serves as a practical resource for learning the ropes of...
i-Haklab : Unleashing The Power Of Termux For Enhanced Cybersecurity
The main objective of the creation of this laboratory is to transport the applications, tools and/or frameworks of a Linux computer environment to the palm of the user's hand thanks to the portability that the Android operating system can provide us. We hope that this project will help contribute to the cybersecurity community and that people can develop efficient...
Dark FB – A Comprehensive Toolkit For Advanced Facebook Interactions
"Dark FB" is a powerful toolkit designed for those who wish to delve deeper into the functionalities of Facebook, offering both offensive and defensive capabilities. From multi-faceted brute force attacks to advanced bot interactions and security features, this tool provides a comprehensive suite for manipulating and safeguarding Facebook accounts. Note: This toolkit should be used responsibly and within the bounds...
Wifi-Hacking.py : Your Ultimate Guide To Ethical WiFi Penetration Testing
Unlock the potential of ethical hacking with Wifi-Hacking.py, a powerful cybersecurity tool designed to navigate the complexities of WiFi security. This robust tool offers a suite of features to monitor, attack, and secure wireless networks, making it a must-have for security professionals and enthusiasts alike. Dive into the capabilities of Wifi-Hacking.py and learn how to safeguard networks against potential...
THREAT ACTORS – TTPs : Decoding The Digital Underworld Through Comprehensive Mapping
This repository was created with the aim of assisting companies and independent researchers about Tactics, Techniques and Procedures adopted by Ransomware Operators/Groups active or not and also threat actors that are operating in society. In addition to mapping Tactics, Techniques and Procedures, I am inserting data on commands, tools, useful locations for researching artifacts and others. The main focus is to...
MagicDot : Harnessing DOT-To-NT Path Conversion For Rootkit-Like Capabilities
A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue. Presented at Black Hat Asia 2024 under the title - MagicDot: A Hacker's Magic Show of Disappearing Dots and Spaces For a deeper understanding of the research, read this blog post - MagicDot: A Hacker's Magic Show of Disappearing Dots and Spaces MagicDot Python Package Implements MagicDot's...