A domain name enumeration tool
The tools contained in domained requires Kali Linux (preferred) or Debian 7+ and Recon-ng
domained uses several subdomain enumeration tools and wordlists to create a unique list of subdomains that are passed to EyeWitness for reporting with categorized screenshots...
Pickl3 is Windows active user credential phishing tool. You can execute the Pickl3 and phish the target user credential.
perational Usage - 1
Nowadays, since the operating system of many end users is Windows 10, we cannot easily steal account information with Mimikatz-like projects like the old...
CrossLinked simplifies the processes of searching LinkedIn to collect valid employee names when performing password spraying or another security testing against an organization. Using similar search engine scraping capabilities found in tools like subscraper and pymeta, CrossLinked will find...
Miteru is an experimental phishing kit detection tool.
How it works
It collects phishy URLs from the following feeds:
CertStream-Suspicious feed via urlscan.io
OpenPhish feed via urlscan.io
PhishTank feed via urlscan.io
Ayashige feed
It checks each phishy URL whether it enables directory...
A cross-platform tool that use Certificates Transparency logs to find subdomains. We currently support Linux, Windows and MacOS.
How it works?
It tool doesn't use the common methods for sub(domains) discover, the tool uses Certificate Transparency logs to find subdomains and it method make it...
FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease.
Features
FinalRecon provides detailed information such as:
Header Information
WHOIS
SSL Certificate Details
Found Flag in SSL Certificate -...
Tool to find and extract credentials from phone configuration files in environments managed by Cisco's CUCM (Call Manager).
When using Cisco's CUCM (Call Manager), phone configuration files are stored on a TFTP server. These phone configuration files quite frequently contain sensitive data...
Sooner or later there comes a turning point, when you have already heard enough stories of all sorts, that real carding is the most dangerous and kind of unstable topic in terms of security. Each of us is being pushed for a different reason. The main purpose of this article is to warn you...
The information that is in this article is very important for understanding carding as a way to overcome the system of protection against illegal payments. We are talking about checking CC CVV Fullz by checker and Credit card response codes. Many believe that if a transaction was rejected, the...
Dumps are of two basic types 101 and 201. What is the difference. The difference in the presence or absence of the chip in the card itself. A 201 card has a greater degree of protection, so for beginners it is recommended to buy dumps 101 at the beginning of their career. Although more...
Converting Your CCV Information To A Fullz
Okay so many of you buy some credit card infos, but they do not come with DOB or SSN. However, there is a way to get them.
Step 1: Getting the phone number
If your info does not have the phone number, you should get it. For that, go on
. Enter the...
Ever wondered what the service codes (101, 201, 203 etc...) meant when buying dumps. The value of the service code determines where the cards are suitable to use and in what way.
4802394718492472=141210111009248 - The underlined section is the service code on a dump.
First digit (Usage...