Shell Scripting – File Encrypter/Decrypter

Hey guys! HackerSploit here back again with another video, in this series we will be looking at how to create shell scripts. A shell script is a computer program designed to be run by the Unix shell, a command-line interpreter. The various dialects of shell scripts are considered to be scripting

Canarytokens – Honeypots Made Easy

What are Cananrytokens? Hey guys! HackerSploit here back again with another video, in this video I will be demonstrating how to setup Canarytokens. Canarytokens lets you implant traps in your production systems rather than setting up separate honeypots. Canarytokens: https://canarytokens.org/generate ‚≠źHelp Support HackerSploit by using the following links: ūüĒó NordVPN: https://nordvpn.org/hacker Use the link above or

The HackerSploit Podcast – Interview With Barrett Brown On The Pursuance Project

Pursuance Project Hey guys! HackerSploit here back again with another podcast. In today's episode, I will interview Barrett Brown, a journalist, activist and the founder of the Pursuance project. Support the Pursuance project Website: https://pursuanceproject.org Kickstarter: https://www.kickstarter.com/projects/85883596/barrett-browns-pursuance-proj

Tortilla – Securely & Anonymously Route Your Traffic Through Tor

tortilla

What is Tortilla? Tortilla is an open source tool that allows users to securely, anonymously, and transparently route all TCP/IP and DNS traffic through Tor, regardless of the client software, and without relying on VPNs or additional hardware or virtual machines. Supported Operating Systems: The tool runs on 32 bit and 64-bit

Recon-ng – Introduction And Installation

anonymize your system

What is Recon-ng? Recon-ng is a full-featured Web Reconnaissance framework written in Python. Complete with independent modules, database interaction, built in convenience functions, interactive help, and command completion, Recon-ng provides a powerful environment in which open source web-based reconnaissance can be conducted quickly and thoroughly. Recon-ng has a look and feel similar

RouterSploit – Router Exploitation Framework

What is RouterSploit? The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices. Installation Requirements Required: future requests paramiko pysnmp pycrypto Optional: bluepy - bluetooth low energy Installation on Kali Linux apt-get install python3-pip git clone https://www.github.com/threat9/routersploit cd routersploit python3 -m pip install -r requirements.txt python3 rsf.py Bluetooth Low Energy support: apt-get install libglib2.0-dev python3 -m pip install bluepy python3 rsf.py Installation on Ubuntu

Metasploit Resource Scripts – How To Automate Scans

What are Metasploit Resource scripts? Resource scripts provide an easy way for you to automate repetitive tasks in Metasploit. Conceptually, they're just like batch scripts. They contain a set of commands that are automatically and sequentially executed when you load the script in Metasploit. You can create a resource script by

PentestBox – Portable Penetration Testing Environment For Windows

What is PentestBox? PentestBox is not like any other Linux pen-testing distribution which either runs in a virtual machine or on a dual boot environment. It essentially provides all the security tools as a software package and lets you run them natively on Windows. This effectively eliminates the requirement of virtual

Veil-Evasion – How To Generate Undetectable Payloads | Antivirus Bypass

What is Veil-Evasion? Veil-Evasion is a tool designed to generate metasploit payloads that bypass common anti-virus solutions. Veil-Evasion was designed to run on Kali Linux, but should function on any system capable of executing python scripts. Simply call Veil-Evasion from the command line, and follow the menu to generate a payload. Upon creating the payload, Veil-Evasion