P-Gen

0

About Tool: The Python-based P-gen tool generates random passwords in a matter of milliseconds. This tool is compatible with both rooted and non-rooted Android devices. Available ON : Termux TESTED ON: Termux REQUIREMENTS : Internet storage 200 MB FEATURES : Stable tool! Updated maintenance! Best in termux! Easy for Beginners! INSTALLATION : apt-get update -y apt-get upgrade -y pkg install python -y pkg install python2 -y pkg install git -y pip install lolcat pip install requests pip install random git clone...

Cracking the User Credentials using the John the Ripper

0

I am going to demonstrate two ways in which we will crack the user credentials using John the Ripper. So, before diving in, we need to know what a shadow file is.  A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is accessible only to the root user, preventing unauthorized...

Top 5 popular Web Scanner for Kali Linux

0

Here are five well-known Web Scanner for Kali Linux, along with their brief descriptions, installation, and usage examples: Kali Linux is a popular distribution for penetration testing and ethical hacking, and it comes with a wide range of tools for web application scanning. 1. Nikto: Nikto is a powerful web server scanner that identifies potential vulnerabilities and misconfigurations in web servers. Installation:sudo apt...

007-TheBond

0

Information about the Script Finding information about your friends, family, enemies, and the crush who will not talk to you is made possible by the 007-TheBond OSNIT Script.  Features Instagram OSINT Phone number OSINT Search for a Username on Social Media Search the web IplookUp Disclaimer By using the script, you agree that you are responsible for any losses you incur and that DeadShot0x7 will have no liability...

Sashay all in one Automatic Installer

0

Introduction In this article, we will see Sashay Installation. Sashay is an integrated automatic installer for practical Linux-based tools. More than 340 tools are offered. Installation pip install -U sashay Tool Categories Information Gathering  Vulnerability Scanner  Exploitation Tools  Wireless Testing  Forensics Tools  Web Hacking  Stress Testing  Sniffing & Spoofing  Password Attacks  Maintaining Access  IP-tracking Tools programming Languages  DDOS Attacks  Web Servers  Distros How to use Type sashay or sshy from anywhere in your terminal Press to show completion, each number...

Denial of Service (DoS) Attack Using dSniff

0

A Denial-of-Service (DoS) attack using dSniff, aims to bring down a computer system or network so that its intended users cannot access it. DoS attacks achieve this by sending the target excessive traffic or information that causes a crash.  Requirements Linux machine ( I used Kali Linux) Victim OS (Virtual or Real Machine) dSniff tool 1) Installation of dSniff Install a dSniff using the command...

E-Commerce Data: The Secret Behind Any Successful E-Commerce Business

0

In the 21st century, data is a valuable asset for businesses operating in all industries, including E-Commerce, health, travel, etc. Clive Humby, a data science entrepreneur, coined the phrase data is the new oil in 2006. Similar to oil, data is invaluable in its raw condition; rather, value is taken when it is collected quickly and accurately and is...

Nuclearpond : A Utility Leveraging Nuclei To Perform Internet Wide Scans For The Cost Of A Cup Of Coffee

0

Nuclear Pond is used to leverage Nuclei in the cloud with unremarkable speed, flexibility, and perform internet wide scans for far less than a cup of coffee. It leverages AWS Lambda as a backend to invoke Nuclei scans in parallel, choice of storing json findings in s3 to query with AWS Athena, and is easily one of the cheapest ways...

PowerMeUp : A Small Library Of Powershell Scripts For Post Exploitation That You May Need Or Use!

0

This is a powershell reverse shell that executes the commands and or scripts that you add to the powerreverse.ps1 file as well as a small library of Post-Exploitation scripts. This also can be used for post exploitation and lateral movement even. Please use at your own risk I am not and will not be responsible for your actions. Also...

Striker : A Command And Control (C2)

0

Striker is a simple Command and Control (C2) program. This project is under active development. Most of the features are experimental, with more to come. Expect breaking changes. Features A) Agents Native agents for linux and windows hosts. Self-contained, minimal python agent should you ever need it. HTTP(s) channels. Aynchronous tasks execution. Support for multiple redirectors, and can fallback to others when active one goes down. B) Backend...