Note :

Note :

Sunday, August 30, 2020

HOW TO CAPTURE SCREENSHOT IN KALI LINUX? – KALI LINUX TUTORIAL

Kali Linux has been the most advanced penetration testing machine introduced yet. It has the most valuable tools used for every sort of hacking. To take advantage of Kali Linux hacking tools, you have to switch your OS to Kali Linux. You can either install Kali Linux as your default OS or just install as a virtual machine within the same OS. You can learn more about how to install Kali Linux Virtualbox. Today in this tutorial, I am just going to share a very simple Kali Linux tutorial on how to capture screenshot in Kali Linux. It's very simple and newbie friendly.

SO, HOW TO CAPTURE SCREENSHOT IN KALI LINUX? – KALI LINUX TUTORIAL

There are two ways to capture a screenshot in Kali Linux. One is the ultimate easy one and the second one is a bit complex but it's also not so complicated. So, don't worry about anything.

INSTRUCTIONS TO FOLLOW

  • In a first way, you can take a screenshot in a similar way as you take in Windows OS by simply clicking the PrntScr button on the keyboard. As you hit that button, a screenshot will be saved in the Pictures folder of your Kali Linux. The major problem with it, it only captures the full screen. We have no control over it to capture a specific window or region.
  • The second way is to take a screenshot using the command. For that, open up a terminal in the Kali Linux and type apt-get install ImageMagick.
  • Once the command is completed and ImageMagick is installed. We have two options to take a screenshot with it. One is to capture full screen and second is to capture a specific window.
  • To capture full screen, type import -window root Pictures/AnyNameOfTheImage.png in the terminal. It will take a full screenshot and will save it to the Pictures directory by the name you specify. Make sure to type .png  at the end of the file name.
  • To take a screenshot of a specific window or region, type import Pictures/AnyNameOfTheImage.png in the terminal and hit Enter, it will turn the cursor to a selection tool. You just click the mouse button and select the area you want to capture. As you will leave the mouse key, screenshot will be saved in the Pictures folder.
That's all how you can capture screenshot in Kali Linux. This is a very simple and beginner-friendly Kali Linux tutorial to help out all the newbies how they can use this features in need. Hope it will be useful for you.

More articles


  1. Pentest Tools List
  2. Pentest Tools For Ubuntu
  3. Hack Tools Pc
  4. Tools Used For Hacking
  5. Pentest Tools
  6. Bluetooth Hacking Tools Kali
  7. What Is Hacking Tools
  8. Pentest Tools List
  9. Android Hack Tools Github
  10. Pentest Tools Linux
  11. Hacking Tools Mac
  12. Hack Rom Tools
  13. Best Hacking Tools 2020
  14. Pentest Tools Website Vulnerability
  15. Hacking App
  16. Tools Used For Hacking
  17. Hack Tools For Games
  18. Hacking Tools Pc
  19. Hacker Search Tools
  20. Hack Tool Apk
  21. Hacking Tools For Mac
  22. Hacker Tools For Pc
  23. Pentest Tools Apk
  24. Tools 4 Hack
  25. Hacking Tools For Windows 7
  26. Usb Pentest Tools
  27. Nsa Hack Tools
  28. Hack And Tools
  29. Hack Tools 2019
  30. Hackers Toolbox
  31. Blackhat Hacker Tools
  32. Hack Rom Tools
  33. Hacking Tools For Mac
  34. Best Hacking Tools 2020
  35. Hack Tools 2019
  36. Hacking Tools Software
  37. Install Pentest Tools Ubuntu
  38. Hack Tool Apk No Root
  39. Hacker Tools List
  40. Hack Tools For Pc
  41. Hacking Tools Online
  42. Hack Tools For Windows
  43. Hack Tools Pc
  44. Hack Apps
  45. What Are Hacking Tools
  46. New Hacker Tools
  47. Pentest Tools Apk
  48. Install Pentest Tools Ubuntu
  49. Pentest Tools Online
  50. Hack Tools Github
  51. How To Install Pentest Tools In Ubuntu
  52. Pentest Tools For Android
  53. Hack Tools For Ubuntu
  54. Hacker Security Tools
  55. Pentest Tools Tcp Port Scanner
  56. How To Install Pentest Tools In Ubuntu
  57. Github Hacking Tools
  58. Usb Pentest Tools
  59. Easy Hack Tools
  60. Hack And Tools
  61. Game Hacking
  62. Hack Apps
  63. Hacking Tools Usb
  64. Hacking Tools
  65. Pentest Tools List
  66. Pentest Tools Windows
  67. Hacker Tool Kit
  68. Pentest Reporting Tools
  69. Hack App
  70. Hack Tools Online
  71. Hack Tools Online
  72. Pentest Tools List
  73. Hacking Tools Windows
  74. Pentest Tools Bluekeep
  75. New Hacker Tools
  76. Pentest Tools Url Fuzzer
  77. Hacking Tools Kit
  78. Nsa Hack Tools
  79. Pentest Tools For Android
  80. New Hack Tools
  81. Hacker Tools List
  82. Underground Hacker Sites
  83. Hack Tools Github
  84. Hacking Tools For Pc
  85. Best Hacking Tools 2020
  86. Pentest Tools Windows
  87. Hacker Tools Apk Download
  88. Growth Hacker Tools
  89. Hacking Tools For Pc
  90. Ethical Hacker Tools
  91. Tools For Hacker
  92. Hacker Tools Software
  93. Game Hacking
  94. Nsa Hacker Tools
  95. Pentest Tools Find Subdomains
  96. Hacking Tools Windows 10
  97. Hack Tools For Pc
  98. Hacking Tools For Kali Linux
  99. Black Hat Hacker Tools
  100. Hack Tools Online
  101. Pentest Tools Github
  102. Hacking Tools Usb
  103. Hacker Tools For Windows
  104. Hacker Tools Hardware
  105. Hacker Tools Hardware
  106. What Are Hacking Tools
  107. Bluetooth Hacking Tools Kali
  108. World No 1 Hacker Software
  109. Install Pentest Tools Ubuntu
  110. Hacker Tools List
  111. Nsa Hack Tools
  112. Hacking Tools Pc
  113. Hacking Tools For Windows Free Download
  114. Top Pentest Tools
  115. Hacker Techniques Tools And Incident Handling
  116. Hak5 Tools
  117. Hacking Tools Mac
  118. How To Hack
  119. Best Hacking Tools 2019
  120. Android Hack Tools Github
  121. New Hack Tools
  122. Hacker Tools Github
  123. Hacker Tools List
  124. Hacking Tools Mac
  125. Hacking Tools For Kali Linux
  126. Hacking Tools Kit
  127. How To Hack
  128. Hacker Tools For Ios
  129. Best Hacking Tools 2019
  130. Hack Tools For Mac
  131. Hacker Search Tools
  132. Github Hacking Tools
  133. Tools For Hacker
  134. Hacker Tools
  135. Pentest Tools Review
  136. Best Hacking Tools 2019
  137. Best Pentesting Tools 2018
  138. Bluetooth Hacking Tools Kali
  139. What Is Hacking Tools
  140. Best Hacking Tools 2019
  141. Hacking Tools 2020
  142. Hacking Tools Software
  143. Android Hack Tools Github
  144. Hack Website Online Tool
  145. Pentest Tools Online
  146. Hacker Tools Apk
  147. Hackrf Tools
  148. Hacker Hardware Tools
  149. Pentest Tools Windows
  150. Hacking Tools For Pc
  151. Pentest Tools For Windows
  152. Hacking Tools Download
  153. Android Hack Tools Github

Hack-Tools - The All-In-One Red Team Extension For Web Pentester


The all-in-one Red Team browser extension for Web Pentesters
HackTools, is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used during a test such as XSS payloads, Reverse shells and much more.
With the extension you no longer need to search for payloads in different websites or in your local storage space, most of the tools are accessible in one click. HackTools is accessible either in pop up mode or in a whole tab in the Devtools part of the browser with F12.

Current functions:
  • Dynamic Reverse Shell generator (PHP, Bash, Ruby, Python, Perl, Netcat)
  • Shell Spawning (TTY Shell Spawning)
  • XSS Payloads
  • Basic SQLi payloads
  • Local file inclusion payloads (LFI)
  • Base64 Encoder / Decoder
  • Hash Generator (MD5, SHA1, SHA256, SHA512)
  • Useful Linux commands (Port Forwarding, SUID)

Preview



Install the application

Chromium based browser
All the available releases are here..
Otherwise, if you want to build the project yourself from the source code

Mozilla Firefox
You can download HackTools on the Firefox browser add-ons here.

Build from source code
yarn install && yarn build
Once the build is done correctly, webpack will create a new folder called dist
After that you need to go to the extension tab on your chrome based navigator and turn on the

developer mode

Then click on the load unpacked button in the top left corner

Once you clicked on the button you just need to select the dist folder and that's it !

Authors
Ludovic COULON & Riadh BOUCHAHOUA




via KitPloit

Continue reading


  1. Hacker Tools Linux
  2. Pentest Tools Free
  3. Hacking App
  4. Hacker Tools Windows
  5. New Hacker Tools
  6. Hacker Search Tools
  7. Hacking Tools And Software
  8. Hacker Tools 2020
  9. Hacking Tools For Windows 7
  10. Termux Hacking Tools 2019
  11. Pentest Tools Url Fuzzer
  12. Pentest Tools Free
  13. Hacker Tools Hardware
  14. Termux Hacking Tools 2019
  15. Pentest Box Tools Download
  16. Pentest Tools Android
  17. Hacking Tools Download
  18. Pentest Automation Tools
  19. Hack Tools Github
  20. Pentest Tools Apk
  21. Tools Used For Hacking
  22. Underground Hacker Sites
  23. Hack Tools Pc
  24. Wifi Hacker Tools For Windows
  25. Hacker Tools Github
  26. Nsa Hack Tools Download
  27. Hacker Tools Github
  28. Best Pentesting Tools 2018
  29. New Hacker Tools
  30. Free Pentest Tools For Windows
  31. Hack Tools For Games
  32. Pentest Tools Website
  33. Hack Tools Mac
  34. Hacking Tools 2019
  35. Kik Hack Tools
  36. Easy Hack Tools
  37. Hacker Tools For Mac
  38. Pentest Tools For Mac
  39. Pentest Reporting Tools
  40. Pentest Tools Url Fuzzer
  41. Hak5 Tools
  42. Hacking Tools 2020
  43. Hack Tools Mac
  44. Hacker Tools For Mac
  45. Hacking Tools Windows
  46. Nsa Hack Tools Download
  47. Hacker Tools For Pc
  48. Hacker Security Tools
  49. Underground Hacker Sites
  50. Pentest Tools Bluekeep
  51. Nsa Hacker Tools
  52. Github Hacking Tools
  53. Github Hacking Tools
  54. Hacker Hardware Tools
  55. Pentest Tools Online
  56. Tools Used For Hacking
  57. Hack Tools For Pc
  58. Hacker Techniques Tools And Incident Handling
  59. Hack Tools Online
  60. Hacking Tools And Software
  61. Hacking Tools Download
  62. Hack Tools 2019
  63. What Are Hacking Tools
  64. Pentest Tools Website Vulnerability
  65. Pentest Tools Open Source
  66. Hacking Tools For Windows
  67. Install Pentest Tools Ubuntu
  68. Pentest Tools Nmap
  69. Hacker Tools For Ios
  70. Hacking Tools Online
  71. Pentest Tools Windows
  72. Pentest Tools Online
  73. Hacking Tools For Kali Linux
  74. Free Pentest Tools For Windows
  75. Hacker Security Tools
  76. Pentest Tools Port Scanner
  77. Hacker Tools Apk
  78. Computer Hacker
  79. Computer Hacker
  80. Hack Tool Apk
  81. Hacker Tools For Windows
  82. World No 1 Hacker Software
  83. Hacker
  84. Pentest Box Tools Download
  85. Hacker Tools For Ios
  86. Pentest Tools
  87. Hack Tool Apk
  88. Hacking Tools For Windows 7
  89. Pentest Recon Tools
  90. Hacking Tools Kit
  91. Pentest Box Tools Download
  92. Hack Tools For Pc
  93. Hacker Tools
  94. Underground Hacker Sites
  95. Pentest Tools Apk
  96. Best Hacking Tools 2019
  97. Black Hat Hacker Tools
  98. World No 1 Hacker Software
  99. Pentest Tools Bluekeep
  100. Usb Pentest Tools
  101. Hack Tools Github
  102. Pentest Tools For Ubuntu
  103. Hacking Tools 2020
  104. Pentest Tools Url Fuzzer
  105. Hacking App
  106. Hack And Tools
  107. Computer Hacker
  108. Blackhat Hacker Tools
  109. Pentest Tools Github
  110. Hack Tools
  111. Hack Tools Online
  112. Pentest Tools Download
  113. Hacker Tool Kit
  114. Hack Website Online Tool
  115. Hacker Tools Apk Download
  116. Hacking Tools For Kali Linux
  117. Hacker Tools 2020
  118. Pentest Tools Bluekeep
  119. Hacker Search Tools
  120. Hacking Tools For Pc
  121. Hacker Tools Free Download
  122. Hack Tools For Mac
  123. Hacking Tools Hardware
  124. Pentest Tools For Mac
  125. Pentest Tools Github

HOW TO HACK A FACEBOOK ACCOUNT? STEP BY STEP

Phishing is the way to obtain sensitive information such as usernames, passwords, and credit card details or any other confidential information, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Phishing is typically carried out by several ways like email spoofing or instant messaging, and it often directs users to enter personal information at a fake website, the look and feel of which are almost identical to the legitimate one. In this tutorial, I will be showing how to hack a facebook account through phishing.

SO, HOW TO HACK A FACEBOOK ACCOUNT?

There are few techniques by which you can hack a facebook account but here the easiest way we'll discuss.

REQUIREMENTS

  1. Phisher Creator ( Fake page generator)
  2. Hosting ( To host a fake page). Either you can purchase one or also can use free hosting like 110mb.com. But in free hosting, the account will be suspended after a few logins.

STEPS TO FOLLOW

  1. Download phisher creator and run it.
  2. As you run it, you'll see a screen like the shown below. Here you can type the fields as I have done. 
  3. Once you hit the Create Phisher button, it'll create a fake facebook index page and fb_login.php file in the output folder.
  4. Now you need to upload these both files index.html and fb_login.php to the hosting account.
  5. After uploading the file, open the index.html file path. It will open up a page like same facebook page as you can see below.
  6. We're all done, now we just need to copy the URL of our fake page and distribute it to the victims, you just have to trick them with your social engineering that how you convenience them to open this URL to login facebook. Once someone tries to login through your fake facebook page URL, you'll get their account username and password in the log_file.txt in the same directory of hosting where you have uploaded index.php and fb_login.php.
Hope it'll work fine for you and you have learned how to hack a facebook account. If you find any question or query related to this, feel free to comment below or you can also follow another way that might work well for you to hack facebook account.

More info


Saturday, August 29, 2020

TorghostNG: Make All Your Internet Traffic Anonymized With Tor Network

About TorghostNG
   TorghostNG is a tool that make all your internet traffic anonymized with Tor network. TorghostNG is rewritten from TorGhost with Python 3.

   TorghostNG was tested on:
  • Kali Linux 2020a
  • Manjaro
  • ...

What's new in TorghostNG 1.2

Before you use TorghostNG
  • For the goodness of Tor network, BitTorrent traffic will be blocked by iptables. Although you can bypass it with some tweaks with your torrent client 😥 It's difficult to completely block all torrent traffic.
  • For security reason, TorghostNG is gonna disable IPv6 to prevent IPv6 leaks (it happened to me lmao).

Screenshots of Torghost (Version 1.0)
   Connecting to Tor exitnode in a specific country: torghostng -id COUNTRY ID

   Changing MAC address: torghostng -m INTERFACE

   Checking IP address: torghostng -c

   Disconnecting from Tor: torghostng -x

   Uninstalling TorghostNG: python3 install.py

Installing TorghostNG
   TorghostNG installer currently supports:
  • GNU/Linux distros that based on Arch Linux
  • GNU/Linux distros that based on Debian/Ubuntu
  • GNU/Linux distros that based on Fedora, CentOS, RHEL, openSUSE
  • Solus OS
  • Void Linux
  • Anh the elder guy: Slackware
  • (Too much package managers for one day :v)

   To install TorghostNG, open your Terminal and enter these commands:
   But with Slackware, you use sudo python3 torghostng.py to run TorghostNG :v

Help
    You can combine multiple choices at the same time, such as:
  • torghostng -s -m INTERFACE: Changing MAC address before connecting
  • torghostng -c -m INTERFACE: Checking IP address and changing MAC address
  • torghostng -s -x: Connecting to Tor anh then stop :v
  • ...
   If you have any questions, you can watch this tutorial videos 🙂
   I hope you will love it 😃

How to update TorghostNG
   Open Terminal and type sudo torghostng -u with sudo to update TorghostNG, but it will download new TorghostNG to /root, because you're running it as root. If you don't like that, you can type git pull -f and sudo python3 install.py.

Notes before you use Tor
   Tor can't help you completely anonymous, just almost:
   It's recommended that you should use NoScript before before surfing the web with Tor. NoScript shall block JavaScript/Java/Flash scripts on websites to make sure they won't reveal your real identify.

And please
  • Don't spam or perform DoS attacks with Tor. It's not effective, you will only make Tor get hated and waste Tor's money.
  • Don't torrent over Tor. If you want to keep anonymous while torrenting, use a no-logs VPN please.
   Bittorrent over Tor isn't a good idea
   Not anonymous: attack reveals BitTorrent users on Tor network

Changes log
   Version 1.2
  • Fixed update_commands and others in torghostng.py
  • Changed a few things in theme.py
  • Changed a few things in install.py
  • Now you can change Tor circuit with -r
   Version 1.1
  • Check your IPv6
  • Change all "TOR" to "Tor"
  • Block BitTorrent traffic
  • Auto disable IPv6 before connecting to Tor

Contact to the coder

To-do lists:
  • Block torrent, for you - Tor network (Done 😃)
  • Connect to IPv6 relays (maybe?)
  • GUI version
  • Fix bug, improve TorghostNG (always)

And finally: You can help me by telling me if you find any bugs or issues. Thank you for using my tool 😊

More articles