Information Gathering Tool
git clone https://github.com/Moham3dRiahi/Th3inspector.git
cd Th3inspector
chmod +x install.sh && ./install.sh
git clone https://github.com/Moham3dRiahi/Th3inspector.git
cd Th3inspector
chmod +x install.sh && ./install.sh
π° How to Get Almost All Udemy Courses for Free [Tested] π°
1. Firstly go to http://dislooks.com/wgpwx
2. Search for your Course, or just look around.
3. There will be many courses with 100% discount, get one of those or any if you want.
4. Select your course.
5. Click on "Get Coupon".
6. And you will be redirected to Udemy's website and a coupon will be applied automatically.
πThat's it! Enjoy your free Courses!π
β @ElliotMalek β
1. Firstly go to http://dislooks.com/wgpwx
2. Search for your Course, or just look around.
3. There will be many courses with 100% discount, get one of those or any if you want.
4. Select your course.
5. Click on "Get Coupon".
6. And you will be redirected to Udemy's website and a coupon will be applied automatically.
πThat's it! Enjoy your free Courses!π
β @ElliotMalek β
git clone https://github.com/skavngr/rapidscan.git
Once the tool is installed, it can be launched using the following command.
./rapidscan.py <target website>
π @HackWormAdmin π
Once the tool is installed, it can be launched using the following command.
./rapidscan.py <target website>
π @HackWormAdmin π
Social Engineering for Absolute Beginners (no coding!)
The most common social engineering attacks every manager should know, because every hacker does!
Identify the most common social engineering attacks (no coding!)
Explain the threat, impact and remediation for the most common attacks
Strengthen your personal firewall!
Coupon Link
https://dislooks.com/YKwWjb
πEducation That Mattersπ
The most common social engineering attacks every manager should know, because every hacker does!
Identify the most common social engineering attacks (no coding!)
Explain the threat, impact and remediation for the most common attacks
Strengthen your personal firewall!
Coupon Link
https://dislooks.com/YKwWjb
πEducation That Mattersπ
π° Search Engine For Hackers π°
1. Censys.io
2. Shodan.io
3. Viz.Greynoise.io/table
4. Zoomeye.org
5. Fofa.so
6. Onyphe.io
7. App.binaryedge.io
8. Hunter.io
9. Wigle.net
10. Ghostproject.fr
1. Censys.io
2. Shodan.io
3. Viz.Greynoise.io/table
4. Zoomeye.org
5. Fofa.so
6. Onyphe.io
7. App.binaryedge.io
8. Hunter.io
9. Wigle.net
10. Ghostproject.fr
Dehash password using Termux
Its purpose is to encode your desired hash text.
Encode & Decode as follows:
1. md5 [encode]
2. sha1 [encode]
3. sha224 [encode]
4. sha256 [encode]
5. sha384 [encode]
6. sha512 [encode]
7. base64 [encode/decode]
8. binary [encode/decode]
9. hexa decimal [encode/decode]
10. cipher of cesar [encode/decode]
11. reverse text
12. reverse words
π°Requirements :- β’ python 3.x
How to Install
$ apt install git
$ apt install python
$ git clone https://github.com/Sup3r-Us3r/HashCode
How to use
RUN:
$ cd HashCode
$ chmod +x *
$ python3 hashcode-en.py
Change Language:
$ ./hashcode-pt.py // For portuguese - mode text
$ ./hashcode-en.py / For english - mode text
Open GUI:
$ ./hashcodegui.py
Its purpose is to encode your desired hash text.
Encode & Decode as follows:
1. md5 [encode]
2. sha1 [encode]
3. sha224 [encode]
4. sha256 [encode]
5. sha384 [encode]
6. sha512 [encode]
7. base64 [encode/decode]
8. binary [encode/decode]
9. hexa decimal [encode/decode]
10. cipher of cesar [encode/decode]
11. reverse text
12. reverse words
π°Requirements :- β’ python 3.x
How to Install
$ apt install git
$ apt install python
$ git clone https://github.com/Sup3r-Us3r/HashCode
How to use
RUN:
$ cd HashCode
$ chmod +x *
$ python3 hashcode-en.py
Change Language:
$ ./hashcode-pt.py // For portuguese - mode text
$ ./hashcode-en.py / For english - mode text
Open GUI:
$ ./hashcodegui.py
GitHub
GitHub - Sup3r-Us3r/HashCode: Its purpose is to encode your desired hash text
Its purpose is to encode your desired hash text. Contribute to Sup3r-Us3r/HashCode development by creating an account on GitHub.
Installation
$ apt-get install git python
$ git clone https://github.com/jaxBCD/Zeebsploit.git
$ cd Zeebsploit
$ python -m pip install -r requirements.txt
$ python zsf.py
$ * and follow instruction
exploits 17
scanners 11
footprinting 10
-- @ElliotMalek --
$ apt-get install git python
$ git clone https://github.com/jaxBCD/Zeebsploit.git
$ cd Zeebsploit
$ python -m pip install -r requirements.txt
$ python zsf.py
$ * and follow instruction
exploits 17
scanners 11
footprinting 10
-- @ElliotMalek --
π PhishX βSpear Phishing Tool for Capturing Credentials π
PhishX is a python tool that can capture user credentials using a spear phishing attack. Spear phishing is a targeted form of phishing attack that is launched against specific individuals. Therefore, some information about an individual is required in order to launch such an attack. Since PhishX is used to capture userβs credentials, the tool generates fake pages and adds target information to said pages. The pages are shared with the target users. If the users share any data on the fake pages, the information is captured by the interface on the attackerβs machine. The pages that can be used (cloned) for spear phishing attack include Facebook, Google, Twitter, Instagram, LinkedIn, Pinterest, Quora, and Steam. All the available pages support the mobile version except LinkedIn.
PhishX is a python tool that can capture user credentials using a spear phishing attack. Spear phishing is a targeted form of phishing attack that is launched against specific individuals. Therefore, some information about an individual is required in order to launch such an attack. Since PhishX is used to capture userβs credentials, the tool generates fake pages and adds target information to said pages. The pages are shared with the target users. If the users share any data on the fake pages, the information is captured by the interface on the attackerβs machine. The pages that can be used (cloned) for spear phishing attack include Facebook, Google, Twitter, Instagram, LinkedIn, Pinterest, Quora, and Steam. All the available pages support the mobile version except LinkedIn.
#Repost
π° FaceBook Phishing Page π°
http://bit.ly/2Q1AD0j
Password : HackWorm
Don't Change AnyThing. Directly Upload on Web Hosting.
π° FaceBook Phishing Page π°
http://bit.ly/2Q1AD0j
Password : HackWorm
Don't Change AnyThing. Directly Upload on Web Hosting.
#Repost
#Only For New Member of this Channel
Complete Ethical Hacking Course From Beginner to Advance
http://bit.ly/2YnOcdC
#Only For New Member of this Channel
Complete Ethical Hacking Course From Beginner to Advance
http://bit.ly/2YnOcdC
The Complete Nmap Ethical Hacking Course : Network Security
https://stude.co/400132/how-to-use-nmap
https://stude.co/400132/how-to-use-nmap