Jump to content


  • Content Count

  • Joined

  • Last visited

Community Reputation

11 Good

About grayhats

  • Rank
    Registered user
  • Birthday 09/16/1991

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. This auxiliary module attempts to reverse provided MD5 hashes by lookup in online databases.
  2. This module exploits a shell command injection in the way "delegates" (commands for converting files) are processed in ImageMagick versions <= 7.0.1-0 and <= 6.9.3-9 (legacy). Since ImageMagick uses file magic to detect file format, you can create a .png (for example) which is actually a crafted SVG (for example) that triggers the command injection. Tested on Linux, BSD, and OS X. You'll want to choose your payload carefully due to portability concerns. Use cmd/unix/generic if need be.
  3. After installing Kali Linux, you usually do som ethings as change sources.list files, install open office, update java, install tor browser… or install some awesome hacking tools as Veil-Evasion, backdoor- factory… It can get more time, so I wrote ddos bash script to resolve this all things. Download
  4. hashcat is better than aircrack-ng to crack wpa/wpa2 wifi password.
  5. A stealthy Python based backdoor that uses Gmail as a command and control server. SETUP: For this to work you need: A Gmail account (Use a dedicated account! Do not use your personal one!) Turn on "Allow less secure apps" under the security settings of the account This repo contains two files: gcat.py a script that's used to enumerate and issue commands to available clients implant.py the actual backdoor to deploy In both files, edit the gmailuser and gmailpwd variables with the username and password of the account you previously setup. You're probably going to want to compile implant.py into
  6. https://www.youtube.com/watch?v=XeucG2bZ9Q8
  7. zANTI is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network.
  • Create New...