Tools Category

PuTTY 0.71 Released

SSH Client Updated To Fix a Large Number of Security Vulnerabilities The free and open-source SSH client updated with the fix for a number of Security Vulnerabilities including the one in RSA key exchange and the latest version is PuTTY 0.71. PuTTY is an SSH and telnet client for the Read more…

 21,401 total views,  16 views today

All the Terms Of Hacking

Common Terms Of Hacking World 1#DDoS: DDoS  means Distributed Denial of Service. This is a type of DOS attack in which multiple compromised systems are used and these systems are often infected with a Trojan. All these infected systems select a target and cause a Denial of Service (DoS) attack. 2# VPS: It stands for Virtual private server Read more…

 168 total views

Tools Category


prototype SSH configuration and policy scanner ssh_scan A SSH configuration and policy scanner Key Benefits Minimal Dependancies – Uses native Ruby and BinData to do its work, no heavy dependancies. Not Just a Script – Implementation is portable for use in another project or for automation of tasks. Simple – Read more…

 146 total views

Tools Category


Cowrie SSH/Telnet Honeypot   Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker. Cowrie is developed by Michel Oosterhof Features Some interesting features: Fake filesystem with the ability to add/remove files. A full fake filesystem resembling Read more…

 137 total views

Tools Category

Create SSH BruteForcer in Python

Create SSH BruteForcer in Python In cryptography, a brute-force attacks consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly. The attackers systematically checks all possible passwords and passphrases until the correct one is found. Alternatively, the attackers can attempt to guess the key Read more…

 87 total views

Tools Category


BruteSpray Brute-Forcing from Nmap output (Automatically attempts default creds on found services) BruteSpray takes nmap GNMAP output and automatically brute-forces services with default credentials using Medusa. BruteSpray can even find non-standard ports by using the -sV inside Nmap. Usage First do an nmap scan with ‘-oA nmap.gnmap’. Command: python Read more…

 110 total views

Enable SSH on Kali Linux

Enable SSH on Kali Linux Kali Linux does not come with SSH enabled. SSH is the preferred method of remote management for most Linux based systems. Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers. It connects, via a secure channel over an Read more…

 94 total views