rat

Powershell-RAT – Python Based Backdoor That Uses Gmail To Exfiltrate Data Through Attachment

Python based backdoor which uses Gmail to eject data through attachments. This RAT will help during the Red Team’s engagement to the rear of any Windows machines. It tracks user activity using screen capture and sends it to an attacker as an e-mail attachment. Powershell-RAT Python based backdoor that uses Gmail to exfiltrate data as…

Read More
hack instagram

Inshackle – Hack Instagram : Track Unfollowers, Increase Your Followers, Download Stories, Etc

Hack Instagram : Track unfollowers, Increase your followers, Download Stories, etc Features: Unfollow Tracker Increase Followers Download: Stories, Saved Content, Following/followers list, Profile Info Unfollow all your following Usage: git clone https://github.com/thelinuxchoice/inshackle cd inshackle bash inshackle.sh Author: github.com/thelinuxchoice/inshackle Download Inshackle

Read More
Information Gathering

ReconCobra – Complete Automated Pentest Framework For Information Gathering

ReconCobra Reconcobra is Foot printing software for Ultimate Information Gathering Kali, Parrot OS, Black Arch, Termux, Android Led TV Interface Software have 82 Options with full automation with powerful information gathering capability In-Action Brief Introduction ReconCobra is useful in Banks, Private Organisations and Ethical hacker personnel for legal auditing. It serves as a defense method to find…

Read More
GDBFrontend GUI Debugger

GDBFrontend – An Easy, Flexible And Extensionable GUI Debugger

GDBFrontend is an easy, flexible and extensionable gui debugger. Installing Deb Package (Debian / Ubuntu / KDE Neon) You can install GDBFrontend via deb package for Debian-based distributions. You can install it from following commands: echo “deb [trusted=yes] https://oguzhaneroglu.com/deb/ ./” | sudo tee -a /etc/apt/sources.list > /dev/null sudo apt update sudo apt install gdbfrontend After…

Read More

ANDRAX – The First And Unique Penetration Testing Platform For Android Smartphones

ANDRAX The first and unique Penetration Testing platform for Android smartphones. What is ANDRAX ANDRAX is a penetration testing platform developed specifically for Android smartphones, ANDRAX has the ability to run natively on Android, so it behaves like a normal Linux distribution, but compared to a common distribution Is more powerful! Why is Android so powerful? Simple, everyone…

Read More

EvilApp – Phishing Attack Using An Android App To Grab Session Cookies For Any Website (ByPass 2FA)

A man-in-the-middle phishing attack using the Android app to grab session cookies for any website, which in turn allows to bypass 2-factor authentication security. EvilApp brings as an example the hijacking and injection of cookies for authenticated Instagram sessions. Legal disclaimer: Usage of EvilApp for attacking targets without prior mutual consent is illegal. It’s the…

Read More

Information Gathering Using Recon-ng Tool

Recon-ng is a full-featured web reconnaissance framework written in Python. With independent modules, database interactions, built-in feature functions, interactive help, and command completion, Recon-ng provides a powerful environment in which open source web-based reconnaissance can be conducted quickly and well. Recon-ng has the same look and feel as the Metasploit Framework, reducing the learning curve…

Read More

Kali Linux Training Free || Kali Linux Complete Course Free Download

Kali Linux Training Free Kali Linux is specifically tailored to the needs of penetration testing professionals. Kali Linux is a Debian-based Linux distribution aimed at advanced penetrations testing and security auditing. Kali has several hundred devices aimed at various information security functions, such as penetration testing, forensics and reverse engineering. Kali Linux is developed, funded…

Read More

Why BGP Hijacking Remains a Security Scourge for Organizations Worldwide?

Border Gateway Protocol (BGP) hijacking, sometimes called prefix hijacking or IP hijacking, occurs when an attacker redirects web traffic away from its intended destination. One such attack had lately impacted more than 200 of the world’s largest content delivery networks (CDNs) and cloud hosting providers. The lesser-known BGP hijacking attack occurred late, affecting more than…

Read More