A terminal user-interface for tshark, inspired by Wireshark.
If you're debugging on a remote machine with a large pcap and no desire to scp it back to your desktop, termshark can help!
Features
Read pcap files or sniff live interfaces (where tshark is permitted).
Inspect each packet using...
Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. There are already...
GhostSquadHackers-Javascript-Encrypter-Encoder_1.png
Encrypt/Encode your Javascript payloads/code. (Windows Scripting)
This tool is meant to encode and encrypt your javascript code.
Features
Number Calculating
ASCII codes
Caeser-Encryption
Hex Encoding
Octal encoding
Binary Encrypt
Random...
New Method Inbound
Tesco Bank Application method will be added today for £100
- Get a UK current account, with debit card, pin & chequebook using Fullz
- Base method is written to work WITHOUT any ID documentation
- Includes a sub-method to work WITH ID documentation (for those with more...
Sure Way To Get 10,000, 25,000, Or Higher Creditcards Even If
Your Credit Sucks!
Materials Needed:
1. USA Fullz (One good person preferably born before 1945) 1A: SS Number, DOB, Address, and in some cases
Licence
1B:Background report ( not required but makes things easy )
2. Computer running...
IP Obfuscator is a simple tool written in python to convert an IP into different obfuscated forms. This tool will help you to obfuscate host addresses into integer, hexadecimal or octal form.
What is Obfuscation?
"In software development, obfuscation is the deliberate act of creating source or...
Yaazhini is a free vulnerability scanner for android APK and API. It is a user-friendly tool that you can easily scan any APK and API of android application and find the vulnerabilities. Yaazhini includes vulnerability scan of API, the vulnerability of APK and reporting section to generate a...
Credmap is an open source credential mapper tool that was created to bring awareness to the dangers of credential reuse. It is capable of testing supplied user credentials on several known websites to test if the password has been reused on any of these.
It is not uncommon for people who...
A terminal user-interface for tshark, inspired by Wireshark.
If you're debugging on a remote machine with a large pcap and no desire to scp it back to your desktop, termshark can help!
Features
Read pcap files or sniff live interfaces (where tshark is permitted).
Inspect each packet using...
Smartphones have permeated into every modern person’s life, and many of the daily tasks we used to perform on a computer are now getting done on our iPhones and Androids (and 2.8% of us apparently still use the Windows phones). Checking emails, accessing social media sites, chatting with...
Netcat is a great network utility for reading and writing to network connections using the TCP and UPD protocol. Netcat is often referred to as the Swiss army knife in networking tools and we will be using it a lot throughout the different tutorials on Hacking Tutorials. Most common use for...
Uniscan is a simple but great tool for Remote File Include, Local File Include and Remote Command Execution vulnerability scanner. In this tutorial we will be exploring the webserver fingerprinting functionality in Uniscan on Kali Linux. The webserver fingerprinting functionality in Uniscan...
So i found many people getting error when they start their server on slave PC or when a slave starts the server. i know that the server still works fine even after errors but the problem is that the slave gets aware about it and can unintall it or disinfect it. So to correct those error . here...
Cryptors, a cyber security company, invented a mobile app called HACKUNA (Anti-Hack) that can block and detect these WiFi hackers. The exciting part here is, you can also track the hackers within the area. It will give you all the details you need to find the hacker within the area or to report...
Bugtraq:
Bugtraq is famous for its electronic mailing list that is purely dedicated to computer security. It is available in Debian, Ubuntu, and OpenSUSE. The Bugtraq developer team consists of experienced
hackers and developers that offer a great service for ethical pen testers. It comes with a...
MICROSOFT WORD INTRUDER (MWI)
MWI - professional "means of delivery", the exploit pack on the basis of a number of the most urgent one-day vulnerabilities in the products of Microsoft Office Word. Document generated MWI may contain exploits with up to 4 at once:
1. CVE-2010-3333
2...
this will allow you to transfer your paypal balance into a vcc this provides you
after this method you will finally get to spend money on real things!
No credit card no problem
Go to bancore.com | neteller.com | money.yandex.ru
You know the basics, sign up. But when you're registering, you...
Let’s face it. Phishing attacks aren’t just an obstacle for large, high-profile organizations anymore. They’re an unfortunate reality of doing business for all organizations of all sizes around the globe. Because many types of phishing attacks such as business email compromise (BEC) and email...
So today I came past a neat little trick I used to use in Computer Stores when I wanted the WiFi password to the companies connection. Computer companies always disable the Network & Sharing center so that you can't look into the properties of a connection and get the password from the...