Profile cover photo
Profile photo
Hacking Vision
13 followers
13 followers
About
Communities and Collections
Posts

Post has attachment
Read our disclaimer before you continue. This tool is only provided as a convince any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors of hackingvision.com will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

Note: This description has been translated from Portuguese.

GonnaCry is a Ransomware that encrypts all user files, files won’t be able to be retrieved without being backed up, or until you communicate with the server to retrieve the private key and thus undo the encryption. GonnaCry should not be used to harm anyone, it’s just an academic program, done to generate study and learning. It is not completely complete, nor does it have all the features of WannaCry2.0, however, it contains some of its features. Beware of using GonnaCry. Do not run on your computer.

Post has attachment

Post has attachment
CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases.

Misconfigured DNS scan using DNSDumpster.com.
Scan the Crimeflare.com database.
Bruteforce scan over 2500 subdomains.

https://hackingvision.com/2017/07/16/cloudfail-utilize-misconfigured-dns-find-hidden-ips-behind-cloudflare-network/

Post has attachment

Post has attachment
My Social Chat Bot This bot uses social media information and data from https://hackingvision.com to give a responce bot can be trained in real time at bottr.me

Post has attachment
Scan Web Servers For Vulnerabilities Using Nikto Kali Linux

Before attacking a website its vital to do reconnaissance on the target website this helps us gather & log various information about the website or target web application. This then helps understand what configuration the target web server is using. Doing a little re-con allows pen-testers to save a lot of time by targeting the configuration of the web server and web application the attacker can quickly find exploits to comprise the target web server.

Post has attachment

Post has attachment
It is very important to keep SQL databases secure as they can often hold a lot of information about the website and its configuration. MySQL databases can also hold important client information and details.

Post has attachment
airgeddon – multi-use bash script to audit wireless networks

Post has attachment
Some extra phishing scenarios for wifiphisher read disclaimer before downloading these scripts.
Wait while more posts are being loaded