Sunday 31 January 2016

Kali NetHunter


Kali NetHunter



Kali NetHunter is developed by offensive security for android devices which will turn your android devices into a hacking machine which lots of software’s inbuilt like wifi hacking aircrak-ng, wifite etc.. the file is available in zip file if you want to install the NetHunter in your android then your phone must be rooted if don’t know how to root your android devices you can check out my other post it is explained in detailed how to root android phones if you don’t know how to use kali Linux then it’s of no use installing  kali nethunter there are various type of attacks present in kali nethunter like MITM attack man in the middle attack using this one can sniff password on the network kill connections can monitor who is using the wifi get his cookies get password etc…

HOW TO INSTALL NETHUNTER

To install nethunter you have to first download nethunter file from offensive security website…

Then copy the file in your sd card…
Reboot into the recovery by pressing power+volume up+home(in Samsung phones) it may vary depending on your phone…

Clockwork mod recovery will open then select choose zip from sd card then select the nethunter file you have copied earlier…


Then tap on apply update it will take 10 to 15 minute to update then your android will restart and shows android is upgrading its done you have kali nethunter installed in your phone enjoy…..  

Thursday 7 January 2016

Earn online with adhits and much more

Earn online with adhits and much more

Get paid by doing surveys, completing offers, and clicking ads ptc sites

 click on the below links to find a job online best paid and trusted sites on internet earn online investing zero there are lots of links below just find one job you want in which you are interested you will get paid through paypal account or bank transfer directly in your account or you will get a cheque according through your location dont waste your time get started click any below link you want to get started and earn online these are the best trusted sites if you cannot see the links below then open the link in opera mini, mozilla firefox, or google chrome browser it will not show up in uc browser if you are interested in earning online comment below....

if you want free recharge tricks facebook hacking tricks and other hacks please visit the site www.cybertwist.blogspot.com  check my other posts on hacking tutorials for any requests comment below or send me a email from contact me section..... enjoy keep hacking and earning....flipkart coupons download and install to avail the offer


Wednesday 6 January 2016

Top10 Best Android Hacking Apps

Top 10 Best Android Hacking Apps





Linux is considered the best operating system for Ethical Hacking and Penetration Testing. As android is a linux based operating system so their are various hacking apps for android. So we are sharing a list of android hacking applications which will turns your android device into a hacking machine.


SpoofApp allow us to spoof (Place) calls with any caller ID number. To spoof calls we need SpoofCards which are sold separately. Some other features includes voice changer using which we can change our voice. You can also record the whole conversation. If you are installing the app for first time then you will receives a free 5 minute SpoofCard.
This is a great android hacking app, using this app you can hack private WhatsApp chats, pictures, audios and videos of your friends who are using your WiFi Hotspot. It is detected by antivirus so disable your antivirus before using this app.

APK Inspector

Apk Inspector can be used to reverse engineer any android app, that is you can get the source code of any android application and edit it in order to remove licence and credits. 
This app is used to block a person who is using your WiFi network. You can disable internet connection of for any device which is present in your WiFi network.


I get lots of questions regarding Facebook hacking. DroidSheep allow us to do exactly the same. It allow us to capture social account by hijacking sessions on android devices present in your network.


Eviloperator

This app automatically connects two person in a phone call making them feel that they called each other. A good thing is you can record and save the conversation.


Nmap for Android

Nmap is a popular network security scanner which is also available for android devices. It is used by professionals for network exploration. It works on both non-rooted and rooted phones, But if your device is rooted then you have access to some more features.

dSploit

dSploit is an advance toolkit to perform network security assesments on mobile phones. It is a complete toolkit so you can perform various attacks like password sniffing, real time traffic manipulation, etc

Penetrate Pro

Penetrate Pro is used to calculate WPA/WEP keys for some routers which means it is used for wifi decoding. Some antivirus may flag the app as virus because it uses some security permissions.

Hackode 

This app is designed for security professionals to perform different kinds of exploits. It has different kind of hacking tools like :
  •  Reconnaissance
  •  DNS lookup
  •  IP
  •  MX Records
  •  DNS Dig
  •  Exploits
  •  Security Rss Feed
  •  Google Hacking
  •  Google Dorks
  •  Whois
  •  Scanning
  •  Ping
  •  Traceroute

Tuesday 5 January 2016

Brutus password cracker for windows free download

Brutus password cracker for windows pc



  Introduction


Brutus is one of the fastest, most flexible remote password crackers you can get your hands on - it's also free. It is available for Windows 9x, NT and 2000, there is no UN*X version available although it is a possibility at some point in the future.

                                                   

Features


Brutus version AET2 is the current release and includes the following authentication types :
  1.     HTTP (Basic Authentication)
  2.     HTTP (HTML Form/CGI)
  3.     POP3
  4.     FTP
  5.     SMB
  6.     Telnet
  7.     Other types such as IMAP, NNTP, NetBus etc are freely downloadable from this site and simply imported into your copy of Brutus. You can create your own types or use other peoples.

 The current release includes the following functionality :
  1.     Multi-stage authentication engine
  2.     60 simultaneous target connections
  3.     No username, single username and multiple username modes
  4.     Password list, combo (user/password) list and configurable brute force modes
  5.     Highly customisable authentication sequences
  6.     Load and resume position
  7.     Import and Export custom authentication types as BAD files seamlessly
  8.     SOCKS proxy support for all authentication types
  9.     User and password list generation and manipulation functionality
  10.     HTML Form interpretation for HTML Form/CGI authentication types
  11.     Error handling and recovery capability inc. resume after crash/failure.

You can use brutus for many purpose to find open ports crack password of ftp (file transfer protocol)
and much more change the wifi router password without the authentication of the owner this software is very handy and its for free so download and enjoy ....

System Requirements


Windows 95, Windows 98, Windows NT 4 or Windows 2000. 24 Mb RAM, 5Mb HDD space. TCP/IP network connection.

The hardware requirement of brutus is very low you can install it in any windows pc...

source:-www.hoobie.net

Password for Brutus password cracker

darknet123

Direct download link of brutus is given below..

DOWNLOAD BRUTUS







     

Sunday 3 January 2016

Top ten operating systems for ethical hackers

Most popular operating systems among hackers all around the world.   

 

                             
     

 

Here is the list of top ten hacking os

 
1- Kali Linux:
Kali Linux is an advanced penetration testing tool that should be a part of every security professional’s toolbox. Penetration testing involves using a variety of tools and techniques to test the limits of security policies and procedures. What Kali has done is collect just about everything you’ll need in a single CD. It includes more than 300 different tools, all of which are open source and available on GitHub.You can get it
here.

2-BackBox:

Backbox is a linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. BackBox is a lightweight OS and requires less hardware capacity. The power of this distribution is given by its Launchpad repository core constantly updated to the last stable version of the most known and used ethical hacking tools. The integration and development of new tools inside the distribution follows the commencement of open source community and particularly the Debian Free Software Guidelines criteria.

3-Parrot Security OS:

Parrot Security is an operating system based on Debian GNU/Linux mixed with Frozenbox OS and Kali linux in order to provide the best penetration and security testing experience. it is an operating system for IT security and penetration testing developed by the Frozenbox Dev Team. It is a GNU/Linux distribution based on Debian and mixed with Kali.
Parrot uses Kali repositories in order to take latest updates for almost all the tools, but it also has its own dedicated repository where all the custom packets are kept. This is why this distro is not just a simple Kali “mod” but entire new concept which relies on Kali’s tool repositories. As such, it introduces a lot of new features and different developing choices.Parrot uses MATE as a Desktop Environment. Lightweight and powerful interface is derived from famous Gnome 2, and thanks to FrozenBox highly customizable with captivating icons, ad-hoc themes and wallpapers. System look is proposed and designed by the community members and also members of Frozenbox Network, who are closely following the development of this project.
Click here to download.

4-DEFT:

Deft is Ubuntu customization with a collection of computer forensic programs and documents created by thousands of individuals, teams and companies. Each of these works might come under a different licence. There Licence Policy describe the process that we follow in determining which software we will ship and by default on the deft install CD.
It can be downloaded here.

5-Samurai Web Security Framework:

The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites. In developing this environment, we have based our tool selection on the tools we use in our security practice. We have included the tools used in all four steps of a web pen-test.
You can simply click here to download.

6-Network Security Toolkit:

Network Security Toolkit (NST) is a bootable live CD based on Fedora Core. The toolkit was designed to provide easy access to best-of-breed open source network security applications and should run on most x86 platforms. The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set of open source network security tools.
What we find rather fascinating with NST is that we can transform most x86 systems (Pentium II and above) into a system designed for network traffic analysis, intrusion detection, network packet generation, wireless network monitoring, a virtual system service server, or a sophisticated network/host scanner.
NST can be downloaded here.

7-NodeZero:

It is said the necessity is the mother of all invention, and NodeZero Linux is no different. There team is built of testers and developers, who have come to the census that live systems do not offer what they need in their security audits. Penetration Testing distributions tend to have historically utilized the “Live” system concept of linux, which really means that they try not to make any permanent effects to a system. Ergo all changes are gone after reboot, and run from media such as discs and USB’s drives. However all that this maybe very handy for occasional testing, its usefulness can be depleted when your testing regularly. Its there believe that “Live System’s” just don’t scale well in a robust testing environment.
All though NodeZero Linux can be used as a “Live System” for occasional testing, its real strength comes from the understanding that a tester requires a strong and efficient system. This is achieved in our belief by working at a distribution that is a permanent installation, that benefits from a strong selection of tools, integrated with a stable linux environment.
Download here.

8-GnackTrack:

GnackTrack is an open and free project to merge penetration testing tools and the linux Gnome desktop. GnackTrack is a Live (and installable) Linux distribution designed for Penetration Testing and is based on Ubuntu.
Backtrack is not only a single player in the field of ethical hacking, so you can try some other distribution as well, if you are Gnome lover than must try this, however backtrack 5 is also available on Gnome platform. Just like backtrack, Gnacktrack comes with multiple tools that are really helpful to do a effective penetration testing, it has Metasploit, armitage, wa3f and others wonderful tools.
Download here.

9-Blackubuntu:

Blackbuntu is distribution for penetration testing which was specially designed for security training students and practitioners of information security. Blackbuntu is penetration testing distribution with GNOME Desktop Environment. It’s currently being built using the Ubuntu 10.10 and work on reference BackTrack.
Download here.

10- Backtrack

The other well known linux based Operating system is backtrack that is being used from few pwevious years and best known as the OS for network cracking and pentesting. And its also the one of the best OS that can perform various network hacks with privacy. Download here.

If  you have any questions comment below....

Tor for android orbot stay anonymous on internet

Tor use internet without getting traced

                                                 




What is Tor?

Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.

Why Anonymity Matters

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

Overview

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Staying anonymous


Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use Tor Browser while browsing the web to withhold some information about your computer's configuration.

Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit.
source:- torproject.org

using tor one can change its ip address change their location if someone is using internet from India if checked it will show the location America Russia etc...


Tor is also availabe for windows pc check my other post to download tor for windows pc

note:- this page is not liable for any black hat activity its only for educational purpose...

Keep hacking enjoy for any questions comment below...

Tor use internet without getting traced change ip location

Tor use internet without getting traced

                                                 




What is Tor?
Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.

Why Anonymity Matters

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

Overview

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Staying anonymous


Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use Tor Browser while browsing the web to withhold some information about your computer's configuration.

Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit.
source:- torproject.org

using tor one can change its ip address change their location if someone is using internet from India if checked it will show the location America Russia etc...


Tor is also availabe for android check my other post to download tor for android

note:- this page is not liable for any black hat activity its only for educational purpose...

Keep hacking enjoy for any questions comment below...

Cain and Abel download

Cain and Abel


                                                


Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users.

Cain & Abel has been developed in the hope that it will be useful for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons. The author will not help or support any illegal activity done with this program. Be warned that there is the possibility that you will cause damages and/or loss of data using this software and that in no events shall the author be liable for such damages or loss of data. Please carefully read the License Agreement included in the program before using it.

The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and  some not so common utilities related to network and system security.


advanced password recovery tool


Cain and Abel is a password recovery tool that enables network administrators to test network security, or home users to recover a variety of stored network passwords. The program reports sniffing and recovery of most popular protocols, including FTP, SMTP, POP3, HTTP, mySQL, ICQ, Telnet and others. It can also recover passwords hidden behind asterisk (***), stored in VNC profiles, SQL Server Enterprise Manager, Remote Desktop connections and wireless connections. Other features include LSA Secrets Dumper, Protected Storage password revealer, network enumeration, VoIP filtering and more. Probably one of the most complete network password recovery/security tools you can find. Cain and Abel is intended for network administrators or advanced users. 

using this you can retrieve the wifi password saved cookies view browsing sessions and much more..

source:- oxid.it

note:- hacking is illegal without the authorization this page is not liable for any black hat activity...


for any questions comment below... enjoy