How To Install Metasploit Framework On Any Android Device

Install Metasploit On Android Device

It is one of the best hacking tools out there. Metasploit can do almost everything in terms of compromising a system. This will be a quite short tutorial, let’s dive in. To install Metasploit with Termux you will need the following Requirements: Termux Internet connection Android 5.0 or later How to install Metasploit:   Open Termux, type … Read more

Nearly 5,500 WordPress Websites Infected with Keylogger

Keylogger

Almost 5,500 WordPress websites are infected with a malicious code that logs keystrokes and from time to time it loads in-browser crypto miner. It is being loaded from “cloudflare.solutions” which is not even affiliated with CloudFlare, in any way. It logs everything which a user is typing inside form fields, as soon as the user … Read more

Prochunter – Linux Process Hunter

Prochunter

Prochunter aims to find hidden process with all userspace and most of the kernelspace rootkits. This tool is composed of a kernel module that prints out all running processes walking the task_struct list and creates /sys/kernel/proc_hunter/set entry. A python script that invokes the kernel function and diffs the module output with processes list collected from userspace (/proc … Read more

Bluebox-ng – Node.js VoIP penetration testing framework

Blue-Box

Features Auto VoIP/UC penetration test Report generation Performance RFC compliant SIP TLS and IPv6 support SIP over websockets (and WSS) support (RFC 7118) SHODAN, exploitsearch.net and Google Dorks SIP common security tools (scan, extension/password bruteforce, etc.) Authentication and extension brute-forcing through different types of SIP requests SIP Torture (RFC 4475) partial support SIP SQLi check … Read more

ooniprobe – Network Interference Detection Tool

ooni

OONI, the Open Observatory of Network Interference, is a global observation network which aims is to collect high quality data using open methodologies, using Free and Open Source Software (FL/OSS) to share observations and data about the various types, methods, and amounts of network tampering in the world. “The Net interprets censorship as damage and … Read more

Nishang – PowerShell Penetration Testing Framework

nishang

Nishang is an open source framework and collection of powerful PowerShell scripts and payloads that you can use during penetration testing audit, post exploitation phase or other stages of offensive security auditing. Nishang is useful during various phases of a security auditing process and has many scripts categorized into logical categories such as information gathering, … Read more