Deep Explorer – Tool Which Purpose Is The Search Of Hidden Services In Tor Network, Using Ahmia Browser And Crawling The Links Obtained

Dependencies pip3 install -r requirements.txtalso you should have Tor installedUsagepython3 deepexplorer.py STRING_TO_SEARCH NUMBER_OF_RESULTS TYPE_OF_CRAWLExamples:python3 deepexplorer.py “legal thing" 40 default legal (will crawl if results obtained in browser do not reach 40, also the script will show links which have "legal" string in html [like intext dork in google])python3 deepexplorer.py "ilegal thing" 30 all dni(will crawl every link obtained in browser [ultil reachs 30], also the script will show links which have "dni" string in html [like intext dork in google])python3 deepexplorer.py "legal thing" 30 none (do not crawl, only obtain links from browser)AboutDeep Explorer is a tool designed to search (any) thing in a few secondsAny idea, failure etc please report to telegram: blueudpresults.txt contains results obtaioned in previus searchTested in ParrotOS and Kali Linux 2.0Type of ErrorsError importing… -> You should try manual pip install packageError connecting to server -> Cant connect to ahmia browser If deep explorer can not execute service …, do it manually, deep explorer checks the tor instance at the beginning so it will skip that partContactName: Eduardo Pérez-MalumbresTelegram: @blueudpTwitter: https://twitter.com/blueudpDownload Deep-Explorer

Link: http://feedproxy.google.com/~r/PentestTools/~3/Uky3GEJ7r8k/deep-explorer-tool-which-purpose-is.html

MEC v1.4.0 – Mass Exploit Console

massExploitConsolea collection of hacking tools with a cli ui.Disclaimerplease use this tool only on authorized systems, im not responsible for any damage caused by users who ignore my warningexploits are adapted from other sources, please refer to their author infoplease note, due to my limited programming experience (it’s my first Python project), you can expect some silly bugsFeaturesan easy-to-use cli uiexecute any adpated exploits with process-level concurrencysome built-in exploits (automated)hide your ip addr using proxychains4 and ss-proxy (built-in)zoomeye host scan (10 threads)a simple baidu crawler (multi-threaded)censys host scanGetting startedgit clone https://github.com/jm33-m0/massExpConsole.git && cd massExpConsole && ./install.pywhen installing pypi deps, apt-get install libncurses5-dev (for Debian-based distros) might be needednow you should be good to go (if not, please report missing deps here)type proxy command to run a pre-configured Shadowsocks socks5 proxy in the background, vim ./data/ss.json to edit proxy config. and, ss-proxy exits with mec.pyRequirementsGNU/Linux, WSL, MacOS (not tested), fully tested under Arch Linux, Kali Linux (Rolling, 2018), Ubuntu Linux (16.04 LTS) and Fedora 25 (it will work on other distros too as long as you have dealt with all deps)Python 3.5 or later (or something might go wrong, https://github.com/jm33-m0/massExpConsole/issues/7#issuecomment-305962655)proxychains4 (in $PATH), used by exploiter, requires a working socks5 proxy (you can modify its config in mec.py)Java is required when using Java deserialization exploits, you might want to install openjdk-8-jre if you haven’t installed it yetnote that you have to install all the deps of your exploits or tools as wellUsagejust run mec.py, if it complains about missing modules, install themif you want to add your own exploit script (or binary file, whatever):cd exploits, mkdir your exploit should take the last argument passed to it as its target, dig into mec.py to know morechmod +x <exploit> to make sure it can be executed by current useruse attack command then m to select your custom exploittype help in the console to see all available featureszoomeye requires a valid user account config file zoomeye.conf Download MEC

Link: http://www.kitploit.com/2018/12/mec-v140-mass-exploit-console.html

Sn1per v6.0 – Automated Pentest Framework For Offensive Security Experts

Sn1per Community Edition is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. Sn1per Professional is Xero Security’s premium reporting addon for Professional Penetration Testers, Bug Bounty Researchers and Corporate Security teams to manage large environments and pentest scopes.SN1PER PROFESSIONAL FEATURES:Professional reporting interfaceSlideshow for all gathered screenshotsSearchable and sortable DNS, IP and open port databaseCategorized host reportsQuick links to online recon tools and Google hacking queriesPersonalized notes field for each hostDEMO VIDEO:SN1PER COMMUNITY FEATURES: Automatically collects basic recon (ie. whois, ping, DNS, etc.) Automatically launches Google hacking queries against a target domain Automatically enumerates open ports via NMap port scanning Automatically brute forces sub-domains, gathers DNS info and checks for zone transfers Automatically checks for sub-domain hijacking Automatically runs targeted NMap scripts against open ports Automatically runs targeted Metasploit scan and exploit modules Automatically scans all web applications for common vulnerabilities Automatically brute forces ALL open services Automatically test for anonymous FTP access Automatically runs WPScan, Arachni and Nikto for all web services Automatically enumerates NFS shares Automatically test for anonymous LDAP access Automatically enumerate SSL/TLS ciphers, protocols and vulnerabilities Automatically enumerate SNMP community strings, services and users Automatically list SMB users and shares, check for NULL sessions and exploit MS08-067 Automatically exploit vulnerable JBoss, Java RMI and Tomcat servers Automatically tests for open X11 servers Auto-pwn added for Metasploitable, ShellShock, MS08-067, Default Tomcat Creds Performs high level enumeration of multiple hosts and subnets Automatically integrates with Metasploit Pro, MSFConsole and Zenmap for reporting Automatically gathers screenshots of all web sites Create individual workspaces to store all scan outputAUTO-PWN:Drupal Drupalgedon2 RCE CVE-2018-7600GPON Router RCE CVE-2018-10561Apache Struts 2 RCE CVE-2017-5638Apache Struts 2 RCE CVE-2017-9805Apache Jakarta RCE CVE-2017-5638Shellshock GNU Bash RCE CVE-2014-6271HeartBleed OpenSSL Detection CVE-2014-0160Default Apache Tomcat Creds CVE-2009-3843MS Windows SMB RCE MS08-067Webmin File Disclosure CVE-2006-3392Anonymous FTP AccessPHPMyAdmin Backdoor RCEPHPMyAdmin Auth BypassJBoss Java De-Serialization RCE’sKALI LINUX INSTALL:./install.shDOCKER INSTALL:Credits: @menzowDocker Install: https://github.com/menzow/sn1per-dockerDocker Build: https://hub.docker.com/r/menzo/sn1per-docker/builds/bqez3h7hwfun4odgd2axvn4/Example usage:$ docker pull menzo/sn1per-docker$ docker run –rm -ti menzo/sn1per-docker sniper menzo.ioUSAGE:[*] NORMAL MODEsniper -t|–target [*] NORMAL MODE + OSINT + RECONsniper -t|–target <TARGET> -o|–osint -re|–recon[*] STEALTH MODE + OSINT + RECONsniper -t|–target <TARGET> -m|–mode stealth -o|–osint -re|–recon[*] DISCOVER MODEsniper -t|–target <CIDR> -m|–mode discover -w|–workspace <WORSPACE_ALIAS>[*] SCAN ONLY SPECIFIC PORTsniper -t|–target <TARGET> -m port -p|–port <portnum>[*] FULLPORTONLY SCAN MODEsniper -t|–target <TARGET> -fp|–fullportonly[*] PORT SCAN MODEsniper -t|–target <TARGET> -m|–mode port -p|–port <PORT_NUM>[*] WEB MODE – PORT 80 + 443 ONLY!sniper -t|–target <TARGET> -m|–mode web[*] HTTP WEB PORT MODEsniper -t|–target <TARGET> -m|–mode webporthttp -p|–port <port>[*] HTTPS WEB PORT MODEsniper -t|–target <TARGET> -m|–mode webporthttps -p|–port <port>[*] ENABLE BRUTEFORCEsniper -t|–target <TARGET> -b|–bruteforce[*] AIRSTRIKE MODEsniper -f|–file /full/path/to/targets.txt -m|–mode airstrike[*] NUKE MODE WITH TARGET LIST, BRUTEFORCE ENABLED, FULLPORTSCAN ENABLED, OSINT ENABLED, RECON ENABLED, WORKSPACE & LOOT ENABLEDsniper -f–file /full/path/to/targets.txt -m|–mode nuke -w|–workspace <WORKSPACE_ALIAS>[*] ENABLE LOOT IMPORTING INTO METASPLOITsniper -t|–target <TARGET>[*] LOOT REIMPORT FUNCTIONsniper -w <WORKSPACE_ALIAS> –reimport[*] UPDATE SNIPERsniper -u|–updateMODES:NORMAL: Performs basic scan of targets and open ports using both active and passive checks for optimal performance.STEALTH: Quickly enumerate single targets using mostly non-intrusive scans to avoid WAF/IPS blocking.AIRSTRIKE: Quickly enumerates open ports/services on multiple hosts and performs basic fingerprinting. To use, specify the full location of the file which contains all hosts, IPs that need to be scanned and run ./sn1per /full/path/to/targets.txt airstrike to begin scanning.NUKE: Launch full audit of multiple hosts specified in text file of choice. Usage example: ./sniper /pentest/loot/targets.txt nuke.DISCOVER: Parses all hosts on a subnet/CIDR (ie. 192.168.0.0/16) and initiates a sniper scan against each host. Useful for internal network scans.PORT: Scans a specific port for vulnerabilities. Reporting is not currently available in this mode.FULLPORTONLY: Performs a full detailed port scan and saves results to XML.WEB: Adds full automatic web application scans to the results (port 80/tcp & 443/tcp only). Ideal for web applications but may increase scan time significantly.WEBPORTHTTP: Launches a full HTTP web application scan against a specific host and port.WEBPORTHTTPS: Launches a full HTTPS web application scan against a specific host and port.UPDATE: Checks for updates and upgrades all components used by sniper.REIMPORT: Reimport all workspace files into Metasploit and reproduce all reports.RELOAD: Reload the master workspace report.SAMPLE REPORT:https://gist.github.com/1N3/8214ec2da2c91691bcbcDownload Sn1per v5.0

Link: http://feedproxy.google.com/~r/PentestTools/~3/RLWB_3_Wk9M/sn1per-v60-automated-pentest-framework.html

Kali Linux 2018.4 Release – Penetration Testing and Ethical Hacking Linux Distribution

Welcome to our fourth and final release of 2018, Kali Linux 2018.4, which is available for immediate download. This release brings kernel up to version 4.18.10, fixes numerous bugs, includes many updated packages, and a very experimental 64-bit Raspberry Pi 3 image.New Tools and Tool UpgradesWireguard is a powerful and easy to configure VPN solution that eliminates many of the headaches one typically encounters setting up VPNs. Check out Wireguard post for more details on this great addition.Kali Linux 2018.4 also includes updated packages for Burp Suite, Patator, Gobuster, Binwalk, Faraday, Fern-Wifi-Cracker, RSMangler, theHarvester, wpscan, and more. For the complete list of updates, fixes, and additions, please refer to the Kali Bug Tracker Changelog.64-bit Raspberry Pi 3Has been created a very experimental Raspberry Pi 3 image that supports 64-bit mode. Please note that this is a beta image, so if you discover anything that isn’t working, please alert on the bug tracker.Ensuring your Installation is UpdatedTo double check your version, first make sure your Kali package repositories are correct.root@kali:~# cat /etc/apt/sources.listdeb http://http.kali.org/kali kali-rolling main non-free contribThen after running ‘apt -y full-upgrade’, you may require a ‘reboot’ before checking:root@kali:~# grep VERSION /etc/os-releaseVERSION=”2018.4"VERSION_ID="2018.4"root@kali:~#root@kali:~# uname -aLinux kali 4.18.0-kali2-amd64 #1 SMP Debian 4.18.10-2kali1 (2018-10-09) x86_64 GNU/LinuxIf you come across any bugs in Kali, please open a report on our bug tracker. We’ll never be able to fix what we don’t know about. Download Kali Linux 2018.4If you would like to check out this latest and greatest Kali release, you can find download links for ISOs and Torrents on the Kali Downloads page along with links to the Offensive Security virtual machine and ARM images, which have also been updated to 2018.4. If you already have a Kali installation you’re happy with, you can easily upgrade in place as follows.root@kali:~# apt update && apt -y full-upgradeDownload Kali Linux 2018.4

Link: http://feedproxy.google.com/~r/PentestTools/~3/L9M1Xv19iKQ/kali-linux-20184-release-penetration.html

imR0T – Send A Message To Your Whatsapp Contact And Protect Your Text By Encrypting And Decrypting (ROT13)

imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basically in ROT13 with new multi encryption based algorithm on ASCII and Symbols Substitution.How To UseIt’s simple:# Clone this repositorygit clone https://github.com/Screetsec/imR0T.git# Go into the repositorycd imR0T# Permission Acceschmod +x imR0T# Run the app./imR0TCommand Linehelp: A standard command displaying help.imR0T╺─╸[ cli ] > help | |_ Options:[arguments] help |:| show this message show |:| show all modules from this tools list style |:| show list style use |:| use a module, ex : use [ID] options |:| show module options run |:| Execute the module set |:| Set a value back |:| Back to main clear |:| Clear window ls |:| list directory content cat |:| read file/standard input pwd |:| print name of current/working director exit |:| Exit programConfigurationBefore using feature send message to your whatsapp contact with text encryption. you must config file inconf/whatsapp.confand add your api key# Getting API :# Register in here https://www.apiwha.com/# Use your mail or temp mail 😛 # Setup API KEY# Example : # – api=”CA6DSQ3CLPC6FCQ3CLPC6F"api=""Demo VideoDownload imR0T

Link: http://feedproxy.google.com/~r/PentestTools/~3/xr9d3A7N8RI/imr0t-send-message-to-your-whatsapp.html

Malwoverview – Tool To Perform An Initial And Quick Triage On Either A Directory Containing Malware Samples Or A Specific Malware Sample

Malwoverview.py is a simple tool to perform an initial and quick triage on a directory containing malware samples (not zipped).This tool aims to :Determining similar executable malware samples (PE/PE+) according to the import table (imphash) and group them by different colors (pay attention to the second column from output). Thus, colors matter! Determining whether executable malware samples are packed or not packed according to the following rules: 2a. Two or more sections with Entropy > 7.0 or < 1.0 ==> Packed. 2b. One one section with Entropy > 7.0 or two sections with SizeOfRawData ==> Likely packed. 2c. None section with Entropy > 7.0 or SizeOfRawData ==> not packed.Determining whether the malware samples contain overlay. Determining the .text section entropy. Malwoverview.py only examines PE/PE+ files, skipping everything else. Checking each malware sample against Virus Total.REQUERIMENTSThis tool was tested on a Kali Linux 2018 system. Therefore, it will be necessary to install:Python version 2.7.x. $ apt-get install pythonPython-magic.To install python-magic package you can execute the following command: $ pip install python-magicOr compiling it from the github repository: $ git clone https://github.com/ahupp/python-magic$ cd python-magic/$ python setup.py build$ python setup.py installAs there are serious problems about existing two versions of python-magic package, my recommendation is to install it from github (second procedure above) and copy the magic.py file to the SAME directory of malwoverview tool. Pefile and colorama packages: $ pip install pefile$ pip install colorama$ pip install simple-json$ pip install requestsUSAGETo use the malwoverview, execute the command as shown below: $ python malwoverview -d <directory> -f <fullpath> -i <0|1> -b <0|1> -v <0|1> -a <0|1> -p <0|1> -s <0|1> -x <0|1>where: <directory> -d is the folder containing malware samples. <fullpath> -f specifies the full path to a file. Shows general information about the file (any filetype). (optional) -b 1 forces light gray background (for black terminals). It does not work with -f option. (optional) -i 1 show imports and exports (it is used with -f option). (optional) -x 1 extracts overlay (it is used with -f option). (optional) -v 1 queries Virus Total database for positives and totals (any filetype). (optional) -a 1 (optional) query Hybrid Analysis database for general report.Thus, you need to edit the malwoverview.py and insert your HA API and respective secret. (optional) -s 1 shows antivirus reports from the main players. This option is used with -f option (any filetype). (optional) -p 1 use this option if you have a public Virus Total API. It forces a one minute wait every 4 malware samples, but allows obtaining a complete evaluation of the malware repository.. If you use Virus Total option, so it is necessary to edit the malwoverview.py and insert your VT API. Remember that public VT API only allows 4 searches per second (as shown at the image above). Therefore, if you are willing to wait some minutes, so you can use the -p option, which forces a one minute wait every 4 malware samples, but allows obtaining a complete evaluation of the repository. *ATENTION: if the directory contains many malware samples, so malwoverview.py could take some time. :)HISTORYVersion 1.4: This version: * Adds the -a option for getting the Hybrid Analysis summary report. * Adds the -i option for listing imported and exported functions. Therefore, imported/exported function report was decoupled for a separated option. Version 1.3: This version: * Adds the -p option for public Virus Total API.Version 1.2: This version includes: * evaluates a single file (any filetype) * shows PE sessions. * shows imported functions. * shows exported function. * extracts overlay. * shows AV report from the main players. (any filetype)Version 1.1: This version: * Adds the VT checking feature.Version 1.0: Malwoverview is a tool to perform a first triage of malware samples in a directory and group them according to their import functions (imphash) using colors. This version: * Shows the imphash information classified by color. * Checks whether malware samples are packed. * Checks whether malware samples have overlay. * Shows the entropy of the malware samples. ScreenshotsImportant aspect: Malwoverview does NOT submit samples to VT. It submits only hashes, so respecting Non-Disclosure Agreements (NDAs).Download Malwoverview

Link: http://feedproxy.google.com/~r/PentestTools/~3/zvjsmu5dk5M/malwoverview-tool-to-perform-initial.html

pwnedOrNot v1.1.0 – Tool To Find Passwords For Compromised Email Accounts Using HaveIBeenPwned API

pwnedOrNot uses haveibeenpwned v2 api to test email accounts and tries to find the password in Pastebin Dumps.Featureshaveibeenpwned offers a lot of information about the compromised email, some useful information is displayed by this script:Name of BreachDomain NameDate of BreachFabrication statusVerification StatusRetirement statusSpam StatusAnd with all this information pwnedOrNot can easily find passwords for compromised emails if the dump is accessible and it contains the password.Tested onKali Linux 18.2Ubuntu 18.04Kali NethunterTermuxInstallationUbuntu / Kali Linux / Nethunter / Termuxchmod 777 install.sh./install.shUsagepython pwnedornot.py -husage: pwnedornot.py [-h] [-e EMAIL] [-f FILE]optional arguments: -h, –help show this help message and exit -e EMAIL, –email EMAIL Email account you want to test -f FILE, –file FILE Load a file with multiple email accountsDemoDownload pwnedOrNot

Link: http://feedproxy.google.com/~r/PentestTools/~3/dL2eqs-9iWs/pwnedornot-v110-tool-to-find-passwords.html

4Nonimizer – A Tol For Anonymizing The Public IP Used To Browsing Internet, Managing The Connection To TOR Network And To Different VPNs Providers

It is a bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs providers (OpenVPN), whether free or paid. By default, it includes several pre-configured VPN connections to different peers (.ovpn files) and download the credentials (if the corresponding provider support it). Also, it records each used IP that we use every 300 seconds in log files.This script is enabled as a service in systemd systems and uses a default vpn (VPNBook) at system startup.Since version 1.06 the dns resolution requests are done throught DnsCrypt (enable and disable with option enable_dns or disable_dns)Since version 1.12 the logs of connections vpn saved in sqlite in /logs/Attention VPN Providers!If you are a provider, you support OpenVPN and want your VPN to be integrated into 4nonimizer contact the developers at hackplayers @ ymail.com.InstallationDownload the repo using git, execute the command ./4nonimizer install in the directory, and follow the screen instructions, 4nonimizer will move to the directory /opt/ and installed as a service.This script has full compatibility with Kali Linux, although it has been properly tested and should also work on other distributions like Debian, Ubuntu and Arch (Manjaro). However there could be some bugs, or unexpected performances (please comments if you find any!).OptionsOnce installed 4nonymizer, enter the command 4nonimizer help to get the help, which shows all the available parameters: ___ _ _ / | (_) (_) / /| |_ __ ___ _ __ _ _ __ ___ _ _______ _ __ / /_| | ‘_ \ / _ \| ‘_ \| | ‘_ ` _ | |_ / _ \ ‘__| \___ | | | | (_) | | | | | | | | | | |/ / __/ | |_/_| |_|\___/|_| |_|_|_| |_| |_|_/___\___|_| By Carlos Antonini & Vicente Motos Version: 1.06-betaUsage: 4nonymizer      install: Install the script in run services     uninstall: Disable run service and remove app directory     change_provider: Change VPN Provider     change_ip: Change IP from VPN current     vpn_status: Check IP and provider VPN running     update_vpns: Update all ovpn of VPNs     start: Init the 4nonimizer service     stop: Stop the 4nonimizer service     stop_nonet: Stop the 4nonimizer service and shutdown network interfaces     restart: Restart the 4nonimizer service     update_app: Update this program via git     privoxy: Install and configure privoxy with port 8118 (BETA)     proxychains4: Install and configure proxychains4 for default in the system     browser: Fire up a firefox browser with profile privoxy -> tor     test_availability: Check peers availability and delete ovpn file if the IP/service is unreachable     location: Now you can select a specific country or continent of the vpn peer     enableboot: You can enable service in boot     disableboot: You can disable service in boot     enable_dnscrypt: Enable dnscrypt service     disable_dnscrypt: Disable dnscrypt service     help: Help (this screen)Available VPNsCurrently it supports the following VPN providers:- 7Proxies https://www.7proxies.com/- AirVPN https://airvpn.org/- Cryptostorm https://cryptostorm.is/- Cyberghost https://www.cyberghostvpn.com/en_US/- ExpressVPN https://www.expressvpn.com- FreeVPN https://freevpn.me/- HideMyAss https://www.hidemyass.com/- IpPVanish https://www.ipvanish.com/- NordVPN https://nordvpn.com- PIA https://www.privateinternetaccess.com/- ProntonVPN https://protonvpn.com/- Proxy.sh https://proxy.sh/- SlickVPN https://www.slickvpn.com- StrongVPN https://strongvpn.com/- TorGuard https://torguard.net/- TunnelBear https://www.tunnelbear.com/- VPNBook (por defecto) http://www.vpnbook.com/- VPNGate http://www.vpngate.net/en/- VPNKeys https://www.vpnkeys.com/- VPNMe https://www.vpnme.me/- Vyprvpn https://www.goldenfrog.com/es/vyprvpnInstall a new VPNTo install an additional vpn we have to use the following structure in order to the 4nonimizer be able to integrate and perform operations with it.First, we have to create the following dir structure /vpn/ within 4nonimizer path:In our example we create the folder /vpntest/ and within it placed all .ovpn files we have. If the files ovpn not have the certificate within each of them we put in the same folder as shown in the example certificate.crt.In addition, we must place a file named pass.txt containing 2 lines: the first one with the username and the second one with the password, as shown below:If we have correctly performed all steps when we execute the command 4nonimizer change_provider the menu will show our vpn:As you can see in the picture, option [7] it is the vpn we’ve created.Getting credencials and ovpn files automaticallyIf the VPN provider allows automation of credential and/or .ovpn files getting, 4nonimizer has standardized the following scripts names and locations:- /opt/4nonimizer/vpn/provider/vpn-get-pass.sh- /opt/4nonimizer/vpn/provider/vpn-get-ovpn.sh4nonimizer automatically detect the presence of both scripts and indicate (Auto-pass Login) or (Auto-get OVPN) if it finds in the first line of each file the expression ‘#4uto’ or ‘#m4nual’ depending on the performed actions.Extras- Execute ‘source 4nonimizer’ to activate autocompletation of parameters.- Copy .conkyrc in your home directory to load a 4nonimizer template and execute conky.Videos- Instalar 4nonimizer Kali Linux https://www.youtube.com/watch?v=FQRuRmMkcDg- 4nonimizer Navegando de manera segura VPN (Kali Linux 2016.2) https://www.youtube.com/watch?v=6GApaN7fSn8- devenir anonyme sur kali linux (4nonimizer) https://www.youtube.com/watch?v=Y3puD1Bw3xA- Anonymizer – How To Hide Your IP address on Kali Linux 2016.2 (Change IP) https://www.youtube.com/watch?v=MNdQD0DCG0A- Become Anonymous on kali linux 2016.2 https://www.youtube.com/watch?v=IFnhm-rrnEg- Auto Hide IP with 4nonimizer on KALI Linux 2017 https://www.youtube.com/watch?v=HgqZCm8Wdvw- Kali Linux – 4nonimizer | Surf Anonymously https://www.youtube.com/watch?v=_mOUQBv4sWsVersions Number codename date 1.00-beta .bye-world! 5/10/2016 1.02-beta .evol-time 11/10/2016 1.03-beta .using-latin-i 17/10/2016 1.04-beta .locateit 22/12/2016 1.05-beta .encrypting 03/01/2017 1.06-beta .1st-trial 18/01/2017 1.07-beta .noname 03/05/2017 1.08-beta .falcon 15/08/2017 1.09-beta .rabbit 09/11/2017 1.10 .fresh_air 27/02/2018 1.11 .shhh 17/05/2018 1.12 .sqliting 18/05/2018 ¡4nonimize the world!Download 4Nonimizer

Link: http://feedproxy.google.com/~r/PentestTools/~3/Pl4_YR4KP9Q/4nonimizer-tol-for-anonymizing-public.html

Spykeyboard – Keylogger Which Sends Us The Data To Our Gmail

This is a script which allows us to generate an undetectable keylogger which sends the captured keys to our gmail mail. Once we generated our keylogger in our kali linux we would have to pass the .py file to a windows machine to convert it to an .exe. The tool is under development.Install module in linux and windows:pip install keyboardCompile to .exeDownload Spykeyboard

Link: http://feedproxy.google.com/~r/PentestTools/~3/Tx81M3bygOo/spykeyboard-keylogger-which-sends-us.html

UPDATE: Kali Linux 2018.3 Release!

PenTestIT RSS Feed
Kali Linux 2018.3 is the latest Kali Linux release. This is the third release which comes after the last release, that was made available in the month of April. This new release includes all patches, fixes, updates, and improvements since the last release – Kali Linux 2018.2, including a shiny new Linux kernel version 4.17.0 and upgrades toRead more about UPDATE: Kali Linux 2018.3 Release!
The post UPDATE: Kali Linux 2018.3 Release! appeared first on PenTestIT.

Link: http://pentestit.com/update-kali-linux-2018-3-release/