LeShnaps

14 Flips | 1 Magazine | 5 Likes | @LeShnaps | Keep up with LeShnaps on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “LeShnaps”

How To: Track Wi-Fi Devices & Connect to Them Using Probequest

Wi-Fi devices are continually emitting "probe frames," calling out for nearby Wi-Fi networks to connect to. Beyond being a privacy risk, probe frames …

Wi-Fi

How To: Hack WPA & WPA2 Wi-Fi Passwords with a Pixie-Dust Attack Using Airgeddon

Design flaws in many routers can allow hackers to steal Wi-Fi credentials, even if WPA or WPA2 encryption is used with a strong password. While this …

Information Security

Python-Rootkit - Python Remote Administration Tool (RAT) To Gain Meterpreter Session

This is a full undetectable python RAT which can bypass almost all antivirus and open a backdoor inside any <b>windows</b> machine which will <b>establish a</b> …

PoT - Phishing On Twitter

<b>Generate tweet automatically like him/her</b><b><br>How it works?</b><br>• 1- Collect data from target's twitter account<br>• 2- Find target's friend and copy her/him account<br>• 3- …

ReelPhish - A Real-Time Two-Factor Phishing Tool

ReelPhish simplifies the real-time phishing technique. The primary component of the phishing tool is designed to be run on the attacker’s system. It …

Forensics

dnscat2 - Create an Encrypted Command & Control (C&C) Channel over the DNS Protocol

dnscat2 is a DNS tunnel that WON'T make you sick and kill you!This tool is designed to create an encrypted command-and-control (C&C) channel over the …

Linux

Dracnmap v2.2 - Exploit Network and Gathering Information with Nmap

Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of …

Linux

Infoga v4.1 – Email Information Gathering

Infoga is a tool for gathering e-mail accounts information from different public sources (search engines, pgp key servers). Is a really simple tool, …

Engines

PSAttack: A Offensive PowerShell Console!

PenTestIT RSS FeedThere is a lot of fun offensive stuff being developed in PowerShell these days. An example is Invoke-Phant0m an excellent Microsoft …

Forensics

How To: Log Wi-Fi Probe Requests from Smartphones & Laptops with Probemon

It's no secret that devices leak data, but sometimes they do so in ways you may not expect. Your phone, laptop, printer, and IOT devices leak Wi-Fi …

EaST - Exploits and Security Tools Framework

Pentest framework environment is the basis of IT security specialist’s toolkit. This software is essential as for learning and improving of knowledge …

Forensics

Microsoft Baseline Security Analyzer

Convivial, l'outil Microsoft Baseline Security Analyzer (MBSA) est conçu pour les informaticiens qui aident les petites et moyennes entreprises à …

Cette extension révèle ce que...

Passwords and hacking: the jargon of hashing, salting and SHA-2 explained

Keeping your details safe in a database is the least a site can do, but password security is complex. Here’s what it all means<p>From Yahoo, MySpace and TalkTalk to Ashley Madison and Adult Friend Finder, personal information has been stolen by hackers from around the world.<p>But with each hack there’s …