|
4 | 4 |
|
5 | 5 | #### Install Kali Linux in WIndows10 Without VirtualBox [YOUTUBE](https://youtu.be/BsFhpIDcd9I) |
6 | 6 |
|
7 | | -## Update Available 2.0 🚀 |
| 7 | +## Update Available 3.0 |
8 | 8 | - [✔] Installation Bug Fixed |
9 | 9 | - [x] Added New Tools |
10 | 10 | - [x] Reverse Engineering |
|
20 | 20 | # Hackingtoolkit Menu |
21 | 21 |
|
22 | 22 | - [Anonymously Hiding Tools (5)](#anonymously-hiding-tools) |
23 | | -- [Information gathering tools](#information-gathering-tools) |
| 23 | +- [Information Gathering Tools (15)](#information-gathering-tools) |
24 | 24 | - [Wordlist Generator](#wordlist-generator) |
25 | 25 | - [Wireless attack tools](#wireless-attack-tools) |
26 | 26 | - [SQL Injection Tools](#sql-injection-tools) |
|
59 | 59 | - [Pagekite](https://pagekite.net) |
60 | 60 |
|
61 | 61 |
|
62 | | -### Information gathering tools |
| 62 | +### Information Gathering Tools |
63 | 63 |
|
64 | | -<img src="https://github.com/CodingRanjith/hackingtoolkit/blob/main/images/h1.jpg" alt=""/> |
| 64 | +<img src="https://github.com/CodingRanjith/hackingtoolkit/blob/main/images/h1.jpg" alt="Information gathering tools"/> |
65 | 65 |
|
66 | 66 | - [Network Map (nmap)](https://github.com/nmap/nmap) |
67 | 67 | - [Dracnmap](https://github.com/Screetsec/Dracnmap) |
68 | | -##Port scanning |
69 | | -#Host to IP |
| 68 | + |
| 69 | + |
| 70 | +## Port scanning |
| 71 | +# Host to IP |
| 72 | + |
70 | 73 | - [Xerosploit](https://github.com/LionSec/xerosploit) |
71 | 74 | - [RED HAWK (All In One Scanning)](https://github.com/Tuhinshubhra/RED_HAWK) |
72 | 75 | - [ReconSpider(For All Scanning)](https://github.com/bhavsec/reconspider) |
|
83 | 86 |
|
84 | 87 | ### Wordlist Generator |
85 | 88 |
|
86 | | -<img src="https://github.com/CodingRanjith/hackingtoolkit/blob/main/images/h2.jpg" alt=""/> |
| 89 | +<img src="https://github.com/CodingRanjith/hackingtoolkit/blob/main/images/h2.jpg" alt="Wordlist Generator"/> |
87 | 90 |
|
88 | 91 | - [Cupp](https://github.com/Mebus/cupp.git) |
89 | 92 | - [WordlistCreator](https://github.com/Z4nzu/wlcreator) |
90 | 93 | - [Goblin WordGenerator](https://github.com/UndeadSec/GoblinWordGenerator.git) |
91 | 94 | - [Password list (1.4 Billion Clear Text Password)](https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got) |
92 | | -### Wireless attack tools |
| 95 | + |
| 96 | + |
| 97 | +### Wireless Attack Tools |
| 98 | + |
| 99 | +<img src="https://github.com/CodingRanjith/hackingtoolkit/blob/main/images/h3.jpg" alt="Wireless Attack Tools"/> |
| 100 | + |
93 | 101 | - [WiFi-Pumpkin](https://github.com/P0cL4bs/wifipumpkin3) |
94 | 102 | - [pixiewps](https://github.com/wiire/pixiewps) |
95 | 103 | - [Bluetooth Honeypot GUI Framework](https://github.com/andrewmichaelsmith/bluepot) |
|
103 | 111 |
|
104 | 112 | ### SQL Injection Tools |
105 | 113 |
|
106 | | -<img src="https://github.com/CodingRanjith/hackingtoolkit/blob/main/images/h0.jpg" alt=""/> |
| 114 | +<img src="https://github.com/CodingRanjith/hackingtoolkit/blob/main/images/h4.jpg" alt="SQL Injection Tools"/> |
107 | 115 |
|
108 | 116 | - [Sqlmap tool](https://github.com/sqlmapproject/sqlmap) |
109 | 117 | - [NoSqlMap](https://github.com/codingo/NoSQLMap) |
|
112 | 120 | - [Blisqy - Exploit Time-based blind-SQL injection](https://github.com/JohnTroony/Blisqy) |
113 | 121 | - [Leviathan - Wide Range Mass Audit Toolkit](https://github.com/leviathan-framework/leviathan) |
114 | 122 | - [SQLScan](https://github.com/Cvar1984/sqlscan) |
115 | | -### Phishing attack tools |
| 123 | + |
| 124 | + |
| 125 | +### Phishing Attack Tools |
| 126 | + |
| 127 | +<img src="https://github.com/CodingRanjith/hackingtoolkit/blob/main/images/h5.jpg" alt="SQL Injection Tools"/> |
| 128 | + |
116 | 129 | - [Setoolkit](https://github.com/trustedsec/social-engineer-toolkit) |
117 | 130 | - [SocialFish](https://github.com/UndeadSec/SocialFish) |
118 | 131 | - [HiddenEye](https://github.com/DarkSecDevelopers/HiddenEye) |
|
122 | 135 | - [QR Code Jacking](https://github.com/cryptedwolf/ohmyqr) |
123 | 136 | - [ShellPhish](https://github.com/An0nUD4Y/shellphish) |
124 | 137 | - [BlackPhish](https://github.com/iinc0gnit0/BlackPhish) |
125 | | -### Web Attack tools |
| 138 | + |
| 139 | + |
| 140 | +### Web Attack Tools |
| 141 | + |
| 142 | +<img src="https://github.com/CodingRanjith/hackingtoolkit/blob/main/images/h6.jpg" alt="SQL Injection Tools"/> |
| 143 | + |
126 | 144 | - [Web2Attack](https://github.com/santatic/web2attack) |
127 | 145 | - Skipfish |
128 | 146 | - [SubDomain Finder](https://github.com/aboul3la/Sublist3r) |
129 | 147 | - [CheckURL](https://github.com/UndeadSec/checkURL) |
130 | 148 | - [Blazy(Also Find ClickJacking)](https://github.com/UltimateHackers/Blazy) |
131 | 149 | - [Sub-Domain TakeOver](https://github.com/m4ll0k/takeover) |
132 | 150 | - [Dirb](https://gitlab.com/kalilinux/packages/dirb) |
| 151 | + |
| 152 | + |
133 | 153 | ### Post exploitation tools |
134 | 154 | - [Vegile - Ghost In The Shell](https://github.com/Screetsec/Vegile) |
135 | 155 | - [Chrome Keylogger](https://github.com/UndeadSec/HeraKeylogger) |
|
0 commit comments