Features 👇 💥 • Protocols supported: HTTP, SIP, IMAP, POP, SMTP, TCP, UDP and IPv6 • Port Independent Protocol Identification (PIPI) for each application protocol;
Multithreading :- • Output data and information in SQLite database or Mysql database and/or files; • At each data reassembled by Xplico is associated a XML file that uniquely identifies the flows and the pcap containing the data reassembled; • Realtime elaboration (depends on the number of flows, the types of protocols and by the performance of computer -RAM, CPU, HD access time, …-); • TCP reassembly with ACK verification for any packet or soft ACK verification; • Reverse DNS lookup from DNS packages contained in the inputs files (pcap), not from external DNS server; • No size limit on data entry or the number of files entrance (the only limit is HD size); IPv4 and IPv6 support :- • Modularity. Each Xplico component is modular. The input interface, the protocol decoder (Dissector) and the output interface (dispatcher) are all modules; • The ability to easily create any kind of dispatcher with which to organize the data extracted in the most appropriate and useful to you. 🔥 💥 If you got any suggestions Let me know in the comment section ✍
💥 • Mimikatz is an open-source tool built to gather and exploit Windows credentials. Coded by Benjamin Deply, the attacks that Mimikatz is capable of have continued to grow. Mimikatz has been linked to Samsam ransomware, Xdata ransomware, and WannaCry. 🔥 💥 If you got any suggestions Let me know in the comment section ✍
Features 👇 💥 • Check if phone number exists and is possible • Gather standard informations such as country, line type and carrier • OSINT footprinting using external APIs, Google Hacking, phone books & search engines • Check for reputation reports, social media, disposable numbers and more • Scan several numbers at once • Use custom formatting for more effective OSINT reconnaissance • Automatic footprinting on several custom formats. 🔥 💥 If you got any suggestions Let me know in the comment section ✍
💥 Edward Joseph Snowden is an American whistle-blower who copied and leaked highly classified information from the National Security Agency in 2013 when he was a Central Intelligence Agency employee and subcontractor. 🔥 💥 If you got any suggestions Let me know in the comment section ✍
💥 It is helpful when someone try to attack you website and you wanna know through logs whether he using tor relay or not. Or you wanna know whether some IP is part of tor network.
💥 If you got any suggestions Let me know in the comment section ✍
The information source is from torproject and internet.
Disclaimer: Information is for educational purposes only, we don't recommend anything illegal.
You will held responsible for your actions.
💥 An attacker can carry on a KRACK attack to inject a malware such as a ransomware or other malicious code into websites.
The researchers explained the KRACK attack works against:
Both WPA1 and WPA2,Personal and enterprise networks,Ciphers WPA-TKIP, AES-CCMP, and GCMP
When the researchers started their tests on the hacking technique, they discovered that the vulnerabilities affect various operating systems, computers and devices such as Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys.
CERT/CC published a detailed list of the affected devices by some variant of the attacks.
The KRACK attack works by exploiting a 4-way handshake of the WPA2 protocol that’s used to establish a key for encrypting traffic.
The experts demonstrated how to execute the key reinstallation attack against an Android smartphone to decrypt a transmission over a protected WiFi.
The researchers explained that KRACK attack is exceptionally effective against Linux and Android 6.0 or higher because it is quite easy for attackers to reinstall already-in-use-key. 💥 If you got any suggestions Let me know in the comment section ✍