GhostEye - Information Gathering Tool for Kali Linux
https://github.com/BullsEye0/ghost_eye Ghost Eye is an Information Gathering Tool I made in python 3. To run Ghost Eye, it only needs a domain or ip. Ghost Eye can work with any Linux distros if they support Python 3. Ghost Eye gathers information data such as:
Whois Lookup DNS Lookup EtherApe Nmap Port Scan HTTP Header Grabber Clickjacking Test Robots.txt Scanner Link Grabber IP Location Finder Traceroute Have I been pwned All information contained in this site and all software provided by it are intended solely for the purpose of helping users to secure their online privacy from eventual cyberattacks. Such information and software do NOT constitute professional advice/services, are indicative and provided for educational use only. The site does not guarantee their accuracy or completeness. The use of such information and software for any purpose other than the abovementioned is strictly forbidden. The site and/or the site’s owner(s) hold no responsibility for any misuse of the above by third parties and reserve their rights to ban the access of users or take any legal action against users, should any misuse be noticed.
https://github.com/FluxionNetwork/fluxion
Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) fewer bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. It's compatible with the latest release of Kali (rolling). Fluxion's attacks' setup is mostly manual, but experimental auto-mode handles some of the attacks' setup parameters. Read the FAQ before requesting issues.
If you need quick help, fluxion is also available on gitter. You can talk with us on Gitter or on Discord.
Installation
Read here before you do the following steps.
Download the latest revision
git clone git@github.com:FluxionNetwork/fluxion.git
# Or if you prefer https
git clone https://www.github.com/FluxionNetwork/fluxion.git
Switch to tool's directory
cd fluxion
Run fluxion (missing dependencies will be auto-installed)
./fluxion.sh
Fluxion is also available in arch
cd bin/arch
makepkg
or using the blackarch repo
pacman -S fluxion
#fluxion #kali #linux
...
https://www.youtube.com/watch?v=NRyZrAKqNvU
Download zeus.vmem
https://github.com/mgoffin/malwarecookbook/blob/master/17/1/zeus.vmem.zip
https://tools.kali.org/forensics/volatility
Volatility Package Description
The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer unprecedented visibility into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.
Volatility supports memory dumps from all major 32- and 64-bit Windows versions and service packs including XP, 2003 Server, Vista, Server 2008, Server 2008 R2, and Seven. Whether your memory dump is in raw format, a Microsoft crash dump, hibernation file, or virtual machine snapshot, Volatility is able to work with it. We also now support Linux memory dumps in raw or LiME format and include 35+ plugins for analyzing 32- and 64-bit Linux kernels from 2.6.11 – 3.5.x and distributions such as Debian, Ubuntu, OpenSuSE, Fedora, CentOS, and Mandrake. We support 38 versions of Mac OSX memory dumps from 10.5 to 10.8.3 Mountain Lion, both 32- and 64-bit. Android phones with ARM processors are also supported. Support for Windows 8, 8.1, Server 2012, 2012 R2, and OSX 10.9 (Mavericks) is either already in svn or just around the corner
...
https://www.youtube.com/watch?v=WXS5u_fncRg
https://github.com/sherlock-project/sherlock
https://sherlock-project.github.io/ Attribuzione audio NCS (NoCopyrightSounds) https://www.youtube.com/channel/UC_aEa8K-EOJ3D6gOs7HcyNg All information contained in this site and all software provided by it are intended solely for the purpose of helping users to secure their online privacy from eventual cyberattacks. Such information and software do NOT constitute professional advice/services, are indicative and provided for educational use only. The site does not guarantee their accuracy or completeness. The use of such information and software for any purpose other than the abovementioned is strictly forbidden. The site and/or the site’s owner(s) hold no responsibility for any misuse of the above by third parties and reserve their rights to ban the access of users or take any legal action against users, should any misuse be noticed.
...
https://www.youtube.com/watch?v=ZzpiNioKDyQ
https://tools.kali.org/password-attacks/crunch
Crunch is a wordlist generator where you can specify a standard character set or a character set you specify. crunch can generate all possible combinations and permutations. Attribuzione audio NCS (NoCopyrightSounds) https://www.youtube.com/channel/UC_aEa8K-EOJ3D6gOs7HcyNg
...
https://www.youtube.com/watch?v=_pz7jLwDrdI