Top 25 Weak Passwords Of All Time

Top 25 Weak  Passwords Of All Time In its sixth annual Worst Passwords report, SplashData, a provider of various security applications and services, listed the 25 weak and easy-to-guess passwords most frequently posted on various hacker forums and websites. Here’s the list 123456 password 12345 12345678 football qwerty 1234567890 1234567 Read more…

Loading

Tools Category

Create SSH BruteForcer in Python

Create SSH BruteForcer in Python In cryptography, a brute-force attacks consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly. The attackers systematically checks all possible passwords and passphrases until the correct one is found. Alternatively, the attackers can attempt to guess the key Read more…

Loading

Tools Category

Brutal

Brutal A Toolkit To Create Various HID Attacks Brutal is a simple toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device. It is used on a target machine without the need for human-to-keyboard interaction ( HID -ATTACK ). When you insert the Read more…

Loading

All about HTTPS SSL Encryption

All about HTTPS SSL Encryption   Analysis of HTTPS SSL Encryption SSL (Secure Socket Layer): Netscape company is designed for WEB security transmission protocol. From the name you can see it in the https protocol stack is responsible for the above-mentioned encryption layer. Article Content HTTPS SSL certificate HTTPS work process One-way Read more…

Loading

Tools Category

Veil 3.0

Veil 3.0 Antivirus evasion and evading detection   The Veil-Framework is a collection of red team security tools that implement various attack methods focused on antivirus evasion and evading detection. Antivirus ‘solutions’ don’t often catch the bad guys, but they do often catch pen-testing during assignment. This tool came about Read more…

Loading

Tools Category

KickThemOut

KickThemOut KickThemOut – Kick Devices Off Your Network A tool to kick devices out of your network and enjoy all the bandwidth for yourself. It allows you to select specific or all devices and ARP spoofs them off your local area network. Compatible with Python 2.6 & 2.7. Installation You Read more…

Loading

Tools Category

WiFi-Pumpkin v0.8.5

WiFi-Pumpkin Framework for Rogue Wi-Fi Access Point Attack     WiFi-Pumpkin is a very complete framework for auditing Wi-Fi security. The main feature is the ability to create a fake AP and make Man In The Middle attack, but the list of features is quite broad. Installation Python 2.7 git Read more…

Loading