Skip to main content

Posts

python - script count whatever you write there

 this script help to check letter, number whatever even space button to write or past in terminal... bydevilzlinux byrockstardevil print "this script made to check number of message you enter it." print "\nthis script created by ROCK STAR DEVIL devilzlinux.blogspot.com" print "\nthis script check space button too.." message = raw_input("enter a message:") print "\nThe length of the message is: ", len(message) raw_input("\n\npress the enter key to exit" )

wifijammer

wifijammer Continuously jam all wifi clients and access points within range. The effectiveness of this script is constrained by your wireless card. Alfa cards seem to effectively jam within about a block radius with heavy access point saturation. Granularity is given in the options for more effective targeting. Requires: python 2.7, python-scapy, a wireless card capable of injection Usage Simple python wifijammer.py This will find the most powerful wireless interface and turn on monitor mode. If a monitor mode interface is already up it will use the first one it finds instead. It will then start sequentially hopping channels 1 per second from channel 1 to 11 identifying all access points and clients connected to those access points. On the first pass through all the wireless channels it is only identifying targets. After that the 1sec per channel time limit is eliminated and channels are hopped as soon as the deauth packets finish sending. Note that it will...

Autovpn – Easily connect to a VPN in a country of your choice

Download autovpn autovpn is a tool to automatically connect you to a random VPN in a country of your choice. It uses openvpn to connect you to a server obtained from VPN Gate . Compiling First clone the repo and cd into the directory: $ git clone https://github.com/adtac/autovpn $ cd autovpn Then run this to generate the executable: $ go build autovpn.go It’s Go. What do you expect? Requirements This requires openvpn . To install this on a yum -based distro : $ sudo dnf install openvpn If you’re on a apt -based distro : $ sudo apt-get install openvpn Tested and works on Fedora 23. Dunno about Windows. Patches welcome. Usage Simply run: $ ./autovpn and you’re done. You’ll be connected to a server in the US. Welcome to the US! You can give a country if you want. For example, if you want to connect to a server in Japan: $ ./autovpn JP You may need superuser privileges. Don’t worry, I’m not running rm -rf --no-preserve-root / ...

Scan website for vulnerabilities with Uniscan Kali Linux Tutorial

Scan website for vulnerabilities with Uniscan Kali Linux tut Welcome back, in this tutorial you will learn how to scan and fingerprint a web server or device to find vulnerabilities.  To achieve this we will be using a tool called Uniscan. This tutorial will require a Linux Operating system we recommend installing Kali Linux if you have not already done so. Requirements: Kali Linux Uniscan (Comes Pre-Installed in Kali Linux) What is Uniscan ? Uniscan is a simple Remote File Include, Local File Include and Remote Command Execution vulnerability scanner that was written in Perl by Douglas Poerschke Roch. Installing Uniscan root@kali:~# apt-get install uniscan listing usage: You can use command uniscan -h to list help options and display usage. root@kali:~# uniscan -h #################################### # Uniscan project                  # # http://uniscan.sourceforge.net/  # ###################################...

Rollmac – Bypass Free Wifi Time & Data Restriction

Rollmac Free networks often impose either a time or data restriction and this can be used quickly. When this happens you can change your mac address and reconnect, but this is annoying, and it takes time. In addition, most networks will ask you to re-accept the terms and conditions of the network in order to continue. Rollmac – Bypass Free Wifi Time & Data Restriction Rollmac is designed to automate this process by using the WPAD protocol to discover the login page and automatically re-accept the terms and conditions. It also maintains a watch of the network current usage and/or time limit to ensure it is never reached. This means you can run downloads overnight or while you are away from your computer, automatically rolling mac’s and reconnecting to the free network. The entire operation usually takes about 10 seconds. You may need to configure the script slightly to adjust to individual network specifics, however, Rollmac allows you to download massive ...

brut3k1t – Server Side Bruteforce Module

Brute-force (dictionary attack, jk) attack that supports multiple protocols and services http://ex0dus-0x.github.io Introduction brut3k1t is a server-side bruteforce module that supports dictionary attacks for several protocols. The current protocols that are complete and in support are: ssh ftp smtp XMPP instagram facebook There will be future implementations of different protocols and services (including Twitter, Facebook, Instagram). Installation Installation is simple. brut3k1t requires several dependencies, although they will be installed by the program if you do not have it. argparse – utilized for parsing command line arguments paramiko – utilized for working with SSH connections and authentication ftplib – utilized for working with FTP connections and authentication smtplib – utilized for working with SMTP (email) connections and authentication fbchat – utilized for connecting with Facebook selenium – utilized for web scraping, which i...

Creating WordPress Admin Phishing Pages

Creating WordPress Admin Phishing Pages.. Hi welcome back today I will show you how to create WordPress phishing pages. Phishing is the practice of sending emails or fake pages in order to trick targets into unknowingly giving personal information such as passwords and credit and debit card numbers. Phishing attacks are a Social Engineering method that relies solely on human error and trickery. Scenario Lets assume we are doing a Pentest on a popular WordPress website the admin has giving us permission to try and phish information from staff members without breaking into their WordPress or gaining information from the SQLDatabases. The site admin has spent 1000’s of dollar maintaining security of his website and believes it to be quite safe although he can’t be to sure that his staff members will compromise his website through human error. A lot of people come to the conclusion that a user must be stupid or an idiot to fall for phishing pages. This is not th...

FIX “Could not get lock /var/lib/dpkg/lock – Resource temporarily unavailable) E: Unable to lock the administration directory (/var/lib/dpkg/), is another process using it?

Fix “Could not get lock /var/lib/dpkg/lock – Resource temporarily unavailable) E: Unable to lock the administration directory (/var/lib/dpkg/), is another process using it? You been installing packages or updating your repositories and you run in an error message from apt. “ Could not get lock /var/lib/dpkg/lock ” this error can become quite annoying to beginners don’t worry I will show you how to remove the lock from /var/lib/dpkg/lock this will remove the lock and allow us to continue installing software and resources from Kali Linux repositories. E: Could not get lock /var/lib/dpkg/lock - open (11: Resource temporarily unavailable) E: Unable to lock the administration directory (/var/lib/dpkg/), is another process using it? Method 1: First open up a new terminal and use the following command to remove the lock. rm /var/lib/dpkg/lock If the lock does not remove first time repeat the process above. The screen shot below shows the process of removing the l...

how to install saavn songs in SD card / extract mp3 from saavn

how to  Extract MP3 from Saavn Songs..  steps 1> download saavan mod version from osmdroid from here -: https://osmdroid.net/saavn-pro-apk-cracked-mod-unlocked-hack/      ---> steps to install saavan hack version                     Instructions :           * Select which type of theme you want. (Original app theme is light)           * Install apk & LOGIN from facebook account ( if facebook login      dos'nt work first time than try once again) fix for "app not install error "         just rename the orginal apk name and again try to install    Extract MP3 from Saavn Songs There are lot of music streaming apps in app stores now. Gaana, Spotify, Saavn, Wynk etc. Most of them also allo...

How to Organize Your Tools by Pentest Stages

How to Organize Your Tools by Pentest Stages In this tut i will give you steps for hacking ... steps how hacking work and how to find everything about victim .. in every steps i have mention soft which we need to used in kali linux ... you can learn about their work from this website or from other.... I like to organize tools based on the phases of a pentest. Then, in each directory, I will symlink to the tool itself (if it's a tool I don't use often), unless I built the tool from source in that directory. With tools installed via Homebrew or from a .pkg, it can help to maintain a copy of the readme file in the directory with the tool named something like $toolname.readme . This will help with more obscure tools, and it can also help by giving you a place to note things about the tool. Phase 1: Reconnaissance This is the information gathering stage, and can be either active or passive. The whole purpose of this phase is to learn—the more information yo...

TX Power - how to increase signal strength in kali linux 2017

Increase Wi-Fi TX Power / Signal Strength USE this command to check your current dbs :-  iwconfig  example -  root@rockstardevil:~# iwconfig lo        no wireless extensions. eth0      no wireless extensions. wlan0     IEEE 802.11  ESSID:"devilzlinux.blogspot.com"           Mode:Managed  Frequency:2.427 GHz  Access Point: D2:99:K2:54:DC:17            Bit Rate=65 Mb/s   Tx-Power=20 dBm             Retry short limit:7   RTS thr:off   Fragment thr:off           Encryption key:off           Power Management:off           Link Quality=49/70  Signal level=-61 dBm...

CyberWar - check real time attack in world

Cyber War Real Time Cyber War – Here are some awesome sites which give you the live detail of Cyber Wars and threats that are occurring in the world. The graphic awesomeness gives you the goosebumps. With details on what ports? Country? Region? Etc.. is available. These contain DDOS attacks also. Worth visiting these - http://map.norsecorp.com/#/ https://cybermap.kaspersky.com/ http://hp.ipviking.com/ https://threatmap.checkpoint.com/ThreatPortal/livemap.html https://www.fireeye.com/cyber-map/threat-map.html

how to Find Your Gateway IP(linux/win/osx)

It's important for you to know the internal IP address of your default gateway, which is normally your router's LAN IP address. If you have ever had to access your router to configure it, you should know the address. It's what you type in your browser address bar to reach the configuration interface (example: http://192.168.1.1/ ) and, if not, you can find it with the following steps: Windows : Click Start > All Programs > Accessories > Command Prompt . When Command Prompt is open, type the following command: ipconfig | findstr /i "Gateway" (You can copy & paste it in the command prompt; just right-click anywhere in the command prompt window and select Paste .) You should see something like this: C:\Documents and Settings\administrator>ipconfig | findstr /i "Gateway" Default Gateway . . . . . . . . . : 192.168.1.1 In this example, your default gateway (router) IP address is 192.168.1.1 . Linux : You...

How can I decode a base64 string from the command line?

If you have ever needed to quickly decode or encode base64, Linux has a command line utility called base64 that works great. I’ll show you how it works! To encode text to base64, use the following syntax: $ echo -n 'devilzlinux.blogspot.com' | base64 ZGV2aWx6bGludXguYmxvZ3Nwb3QuY29tCg== To decode, use base64 -d. To decode base64, use a syntax like the following: $ echo -n ZGV2aWx6bGludXguYmxvZ3Nwb3QuY29tCg== | base64 -d devilzlinux.blogspot.com Note: if on OS X, use capital D: echo -n ZGV2aWx6bGludXguYmxvZ3Nwb3QuY29tCg== | base64 -D same work with another way python ___________________________________________________________ python - m base64 - d <<< "ZGV2aWx6bGludXguYmxvZ3Nwb3QuY29tCg==" devilzlinux.blogspot.com  ____________________________________________________________________ perl _____________________________________________________________ perl - MMIME :: Base64 - ne 'printf "%s\n",decode_base...

Hacking and Gaining Access to Linux by Exploiting SAMBA Service (exploit/multi/samba/usermap_script)

Hacking and Gaining Access to Linux by Exploiting SAMBA Service we are using kali linux 2016.2 with backtrack wallpaper    this attack work on linux os which have open port in  samba becouce we are using exploit/multi/samba/usermap_script and this script work on linux .. Step 1) First, we need to find out the ports and services running on the target system. To find the open ports and services, the command is: Command: nmap -sS -Pn -A 192.168.2.142 Step 2: Once you find the open ports and service like the samba port and service ready, get set for sending an exploit through that port to create a meterpreter session. To perform this attack, you need to open metasploit. Step 3: Once you open metasploit, first we need to find the version of samba Command: – msf> search scanner/samba (This command used to finding the scanner parameter to find samba version) Step 3: Once you find the scanners to find the samba version of the tar...

How to Extract Metadata from Websites Using FOCA for Windows

at is most likely to work against that site or network. In this tutorial, we will looking at FOCA's ability to find, download, and retrieve files from websites with the file's metadata. This metadata can give us insight into such information as the users (could be critical in cracking passwords), operating system (exploits are OS-specific), email addresses (possibly for social engineering), the software used (once again, exploits are OS-, and more and more often, application-specific), and if we are really lucky, passwords. Step 1 Downlaod FOCA for Windows First, let's download FOCA Free 3.0 for Windows . Step 2 Choose Where You Save Results When you install FOCA, you will greeted with a screen like that below. The first task we need to do is to start a new project and then tell FOCA where we want to save our results. Click on image to enlarge. I created a new directory at c:\foca and will save all my results there. Of course, you can save y...

How to Conduct Passive Reconnaissance of a Potential Target

Why Passive Recon? Reconnaissance can be divided into at least two categories, active and passive. Active reconnaissance requires that you interact with the target computer system to gain information about it. Although this can be very useful and accurate, it risks detection. If you're detected doing reconnaissance on a system, the system admin may choose to block your IP address and you'll leave a trail to your subsequent activity. If possible, we would prefer to gather the essential information without ever interacting with the system, thus leaving no trail to trace back to us. That's what passive reconnaissance is. Although there are a number of ways to conduct passive recon, one of the best ways is to use a website like Netcraft . Step 1 Navigate a Browser to Netcraft Let's open a browser and navigate to the Netcraft website. We should see a webpage that looks like this. Netcraft is a UK company that tracks virtually every webs...