Ethical Hacking Tutorials

Ethical Hacking Tutorials, Tips and Tricks

Category: Hack Tools

Pocsuite – An open-sourced Remote Vulnerability Testing Framework

Pocsuite is an open-sourced remote vulnerability testing and proof-of-concept development framework developed by the Knownsec Security Team. It comes with a powerful proof-of-concept engine, many niche features for the ultimate penetration testers and security researchers. How to use Pocsuite with seebug PoC search and zoomeye dork Pocsuite with seebug PoC and zoomeye dork Pocsuite with […]

BScan – Asynchronous Target Enumeration Tool

bscan is a command-line utility to perform active information gathering and service enumeration. At its core, bscan asynchronously spawns processes of well-known scanning utilities, repurposing scan results into highlighted console output and a well-defined directory structure.     bscan was written to be run on Kali Linux, but there is nothing inherently preventing it from […]

ThunderDNS – Tool To Forward TCP Traffic Over DNS Protocol

This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support. Run Setting up NS records on our domain: Please wait for clearing DNS-cache. Simple server run: python3 ./ –domain Simple server run (Dockerfile): docker run <imageid> -e DOMAIN='<domain>’ Simple client run (Bash): bash ./ -d -n <clientname> Simple client […]

Hatch – Tool To Brute Force Most Websites

Hatch is a brute force tool that is used to brute force most websites Installation Instructions git clone python2 Requirements pip2 install selenium pip2 install pyvirtualdisplay pip2 install requests sudo apt-get install xvfb chrome driver and chrome are also required! link to chrome driver: copy it to bin! How to use (text) […]

Scavenger – A Post-Exploitation Scanning/Mapping Tool

SCAVENGER has the ability to find the newest files that have been accessed/modified/created and keep the result in an ordered database. Then, after time has passed, hours or days later the systems can be scanned again. SCAVENGER can then compare the previous list of “newest files” to the latest list of “newest files.” This gives […]

MEC v1.4.0 – Mass Exploit Console

Mec is a collection of hacking tools with a command line graphic user interface.Features an easy-to-use cli ui execute any adpated exploits with process-level concurrency some built-in exploits (automated) hide your ip addr using proxychains4 and ss-proxy (built-in) zoomeye host scan (10 threads) a simple baidu crawler (multi-threaded) censys host scan Getting started when installing […]

Jok3r – Network and Web Pentest Framework

Main features Toolbox management: Install automatically all the hacking tools used by Jok3r, Keep the toolbox up-to-date, Easily add new tools.   Attack automation: Target most common network services (including web), Run security checks by chaining hacking tools, following standard process (Reconaissance, Vulnerability scanning, Exploitation, Account bruteforce, (Basic) Post-exploitation). Let […]

Androspy – Backdoor Crypter & Creator With Automatic IP Poisener

Androspy – Backdoor Crypter & Creator With Automatic IP Poisener Dependencies keytool jarsigner Apache2 Metasploit-Framework xterm Installation sudo apt-get install git git clone cd Androspy chmod +x sudo ./ chmod +x sudo ./ Tested on : BackBox Linux Kali linux Parrot os Contact   Like this: Like Loading… Related

DarkSpiritz v2.0 – A Penetration Testing Framework For Linux, MacOS, And Windows Systems

M4cs | @maxbridglandRyan | @ryan0x1 Version 2.0 UPDATE (READ IMPORTANT)This version should run a lot smoother and have a cleaner UI. Check the reddit post here to see all changes: Getting StartedClone the repository with git: git clone DarkSpiritz wiki available hereTo install DarkSpiritz clone the github repo and run: pip install -r […]

Ethical Hacking Tutorials © 2018
Skip to toolbar