Hidden content
-- HOW TO USE --
>> 1. Put your Mullvad Keys in combo\\combo.txt
>> 2. Set your Proxies in Proxies\\Proxies.txt
>> 3. Launch install.bat and install modules
Hidden content
Prior advice: ensure you have a basic understanding of social engineering, it will take a little bit of trickery to get them to fall for it.
SudoDragon
Thread
cybersecurity
ethical hacking
ip address tracking
networksecurity
online privacy
Useful if u wanna perform little hacks and keep ur identity safe lol
You can switch the ip very quickly !
make sure to have admin privileges.
[new version of kali linux may have permission problems to build torghost so sudo if the command don't work]
METHOD :
Hidden content
SudoDragon
Thread
cybersecurity
ip anonymity
kali linux
networksecurity
privacy protection
I think this is a good alternative to using even paid VPNs because the guide also shows you how to manually disable your logs.
Most VPN providers will tell you they dont keep logs, but this is a way to make sure there is less risk to your activities being tracked
Hidden content
Cheers &...
Anubis is a subdomain enumeration and information gathering tool. Anubis collates data from a variety of sources, including HackerTarget, DNSDumpster, x509 certs, VirusTotal, Google, Pkey, Sublist3r, Shodan, Spyse, and NetCraft. Anubis also has a sister project, AnubisDB, which serves as a...
SudoDragon
Thread
cybersecurity
information gathering
networksecurity
penetration testing
subdomain enumeration
Parasite HTTP Botnet - All Plugins
Parasite HTTP is a professionally coded modular remote administration tool for windows written in C that has no dependencies except the OS itself.
With the stub size of ~49kb and plugin support it presents perfect solution for controlling large amount of...
DNS Rebinding freamwork containing:
a dns server obviously
python web api to create new subdomains and control the dns server, view logs, stuff like that
shitty react app to make it more comfy
Hidden content
SUB-ZER0
Thread
cybersecurity tools
dns rebinding
dnsfookup
networksecurity
penetration testing
If you feel like you have been a victim who has been hacked, I am going to tell you exactly how to check if you have any rats, viruses, trojans, ransomware, etc.
In this tutorial you will learn how to check if you have been hacked, or have spyware on your device, how to remove it and find out...
.
I will be using the Parrot Security OS, since it is my primary Linux dist when it comes to pentesting etc, but you can use most Linux distributions.
For this MitM attack we are going to need Websploit, so let's get it installed
Hidden content
SudoDragon
Thread
cybersecurity
ethical hacking
man-in-the-middle attack
networksecurity
web exploitation
Prerequisites: Kali Linux, Shodan.io account (To find IPs, you can do it too via your own IP NetWave) and a person who uses a Netwave camera
Hidden content
Enjoy
Hey guys, so I recently bought a subscription to a course, and the videos provided are all free, at the start of the video he clearly says that it can be and is encouraged to be shared with other enthusiasts! It is focused on Metasploit, one of the main tools/framework a hacker will use!
The...
SudoDragon
Thread
cybersecurity training
ethical hacking
free course
metasploit
networksecurity
How to Hack a Wi-Fi Network
Step 1: Gather Your Tools
Kali Linux: This is a Debian-derived Linux distribution designed for digital forensics and penetration testing.
Wi-Fi Adapter: Make sure it supports packet injection (e.g., Alfa AWUS036NHA).
Aircrack-ng Suite: Pre-installed in Kali Linux...
This is a white-hat website used by cybersecurity professionals to teach different ways how to break into SSH servers.
You can use it on any desktop, even mobile.
Hidden content
SudoDragon
Thread
cybersecurity training
ethical hacking
networksecurity
penetration testing
ssh security
Description
Metasploit is one of the most common tools used for penetration testing and exploitation. In this course, penetration tester Prashant Pandey shows you various elements of Metasploit, how to apply these elements in penetration testing activities, and what you can do after...
This is a very simple method, some people might know about it some may not, what makes this method so effective is human mistakes. Alot of people can't read code or just completely skip over
the infect line! I've infected atleast 50 boxes in a week. It's pretty effective! Screenshot...
1/ Hacking is a term that often conjures images of cybercrime, but it's essential to distinguish between malicious activities and ethical hacking. Ethical hackers use their skills to identify and fix vulnerabilities, making the digital world more secure. Let's explore the different facets of...
Nightmare
Thread
cybersecurity
data breach
digital forensics
ethical hacking
networksecurity
vulnerability assessment
BackBox is a Ubuntu-based distro developed for penetration testing and security assessment.
BackBox has its software repository that provides the latest stable versions of various system & network analysis toolkits and the most popular ethical hacking tools. Designed with minimalism in mind and...
Nightmare
Thread
backbox os
cybersecurity
ethical hacking
networksecurity
penetration testing
, I shall provide you with some wicked tools and their corresponding commands to aid you in your nefarious endeavors. Brace yourself, for the chaos is about to begin:
1. Aireplay-ng: This dastardly tool is used for wireless network manipulation. Execute the following command to launch a...
Came across this good GitHub repository, that index's a collection of helpful information for getting started with Cobaltstrike.
https://github.com/zer0yu/Awesome-CobaltStrike
0x00 Introduction
0x01 Articles & Videos
1. Basic Knowledge
2. Crack and Customisation
3. Useful Trick
4...
Nightmare
Thread
cybersecurity
ethical hacking
networksecurity
penetration testing
social engineering
"Level Up Your Security Skills with Linux Expertise!"
Key Features
● Comprehensive exploration of Linux network security and advanced techniques to defend against evolving cyber threats.
● Hands-on exercises to reinforce your understanding and gain practical experience in implementing...
Learn Cyber Security like a Real World Hacker! Start as a beginner and go all the way to launching Cyber Attacks.
Download :-
https://mega.nz/folder/8vcm3DyC#V_27ZHpZeDSFIJnjIiqpvQ
#cybersecurity #networksecurity