Transparency Myanmar

transparency.myanmar@gmail.com



PortWitness is a bash tool designed to find out active domain and subdomains of websites using port scanning. It helps penetration testers and bug hunters collect and gather information about active subdomains for the domain they are targeting.PortWitness enumerates subdomains using Sublist3r and uses Nmap alongwith nslookup to check for active sites.Active domain or sub-domains are finally stored in an output file.Using that Output file a user can directly start testing those sites.
Sublist3r has also been integrated with this module.It's very effective and accurate when it comes to find out which sub-domains are active using Nmap and nslookup.
This tool also helps a user in getting the ip addresses of all sub-domains and stores then in a text file , these ip's can be used for further scanning of the target.

Installation
git clone https://github.com/viperbluff/PortWitness.git

BASH
This tool has been created using bash scripting so all you require is a linux machine.

Usage
bash portwitness.sh url




Related news


  1. Pentest Tools Bluekeep
  2. Pentest Tools Free
  3. Bluetooth Hacking Tools Kali
  4. Hack Tools For Windows
  5. Hackrf Tools
  6. Tools For Hacker
  7. Hackrf Tools
  8. How To Install Pentest Tools In Ubuntu
  9. Pentest Tools Github
  10. Hacker Tools For Windows
  11. Pentest Tools Linux
  12. Hacks And Tools
  13. Pentest Tools Subdomain
  14. Top Pentest Tools
  15. Termux Hacking Tools 2019
  16. Hacking Tools 2020
  17. Pentest Automation Tools
  18. Hack Tools
  19. Hack Tools Pc
  20. Hack Tools For Games
  21. Hacker Tools Windows
  22. Hacking Tools For Windows Free Download
  23. Hacker Tools Online
  24. Hacking Tools
  25. Hack Tools For Games
  26. What Are Hacking Tools
  27. Hack Tools Online
  28. Top Pentest Tools
  29. Hacking Apps
  30. Hack Tools Download
  31. Free Pentest Tools For Windows
  32. Hacker Tools Free Download
  33. Hacker
  34. Pentest Tools Windows
  35. Hacker Tools 2020
  36. Hack Tools Download
  37. Pentest Tools Subdomain
  38. Hack Tool Apk No Root
  39. Game Hacking
  40. Hacker Security Tools
  41. Pentest Tools Port Scanner
  42. Pentest Tools Subdomain
  43. Hacking Apps
  44. Pentest Tools Alternative
  45. Hacking Tools For Mac
  46. Pentest Tools Framework
  47. Pentest Tools For Ubuntu
  48. New Hack Tools
  49. Black Hat Hacker Tools
  50. Pentest Tools
  51. Hacker Tools Hardware
  52. Hacker Tools Github
  53. New Hacker Tools
  54. Hacker Tools Software
  55. Hack Tools 2019
  56. Hacking Tools Free Download
  57. Hacks And Tools
  58. Hacking Tools And Software
  59. Pentest Tools Open Source
  60. Pentest Recon Tools
  61. Pentest Recon Tools
  62. Hackers Toolbox
  63. Pentest Tools For Ubuntu
  64. Game Hacking
  65. Pentest Tools Apk
  66. Bluetooth Hacking Tools Kali
  67. Hacker Tools List
  68. Hack Tools Download
  69. Hack Tool Apk No Root
  70. Best Hacking Tools 2020
  71. Top Pentest Tools
  72. Hacker Techniques Tools And Incident Handling
  73. Nsa Hack Tools Download
  74. Hack Tools Github
  75. Beginner Hacker Tools
  76. Bluetooth Hacking Tools Kali
  77. Hack Tools Github
  78. Nsa Hack Tools
  79. Hacker Tools Apk
  80. Pentest Box Tools Download
  81. Hacker Tools Windows
  82. World No 1 Hacker Software
  83. Hacking Tools Usb
  84. Termux Hacking Tools 2019
  85. Hack Tool Apk
  86. Usb Pentest Tools
  87. Hacker Tools List
  88. Hacker Tools 2020
  89. Pentest Tools Website Vulnerability
  90. Install Pentest Tools Ubuntu
  91. Hacking Tools For Windows
  92. Hacker Tools Github
  93. Best Hacking Tools 2020
  94. Pentest Tools For Android
  95. Ethical Hacker Tools
  96. Hacking Tools Name
  97. Hacking Tools Usb
  98. Kik Hack Tools
  99. Pentest Tools Subdomain
  100. Hacking Tools Windows
  101. Hacker Tools Mac
  102. Hack Tools 2019
  103. Hacker Hardware Tools
  104. Pentest Tools Free
  105. Pentest Tools Android
  106. Pentest Tools Subdomain
  107. Android Hack Tools Github
  108. Blackhat Hacker Tools
  109. Pentest Tools Linux
  110. Game Hacking
  111. Hacking Tools For Beginners
  112. Pentest Tools Android
  113. Pentest Tools Free
  114. Hacking Tools For Windows 7
  115. Hack Tools
  116. How To Hack
  117. Github Hacking Tools
  118. Hacking Tools For Kali Linux
  119. Ethical Hacker Tools
  120. Hack Tools Mac
  121. Pentest Tools
  122. Hacking Tools Download
  123. Growth Hacker Tools
  124. Hacking Tools Name
  125. Hack Tools Pc
  126. Pentest Tools Review
  127. Hacks And Tools
  128. Pentest Tools Subdomain
  129. Beginner Hacker Tools
  130. Hacking App
  131. Tools 4 Hack
  132. Pentest Tools Framework
  133. Hacker Tools Free Download
  134. Hack Tools Pc
  135. Hacker Tools Hardware
  136. Hacking Tools For Beginners
  137. Hacking Tools For Games
  138. Physical Pentest Tools
  139. Underground Hacker Sites
  140. Tools Used For Hacking
  141. Pentest Tools Alternative
  142. Pentest Tools For Mac
  143. Pentest Tools Apk
  144. Pentest Tools List

The OWASP Foundation would like to thank the OWASP Las Vegas Chapter Volunteers for taking the time out of their busy schedule to give back and volunteer to work the booth at BlackHat 2019.  It was great meeting our Las Vegas OWASP members and working with Jorge, Carmi, Dave, and Nancy.  
Also, take a moment to thank Global Board Members Martin Knobloch, Owen Pendlebury, and Gary Robinson for also working the booth and speaking with individuals and groups to answer questions on projects and suggestions on the use of our tools to address their work problems.
OWASP can not exist without support from our members.  More info

This video is specially for educational purpose only. I'm not responsible for your any illegal activity. Thanks!

 Social Engineering Attack

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. The purpose of this video tutorial is to show you How hackers hacked any thing by Social Engineering Attack.

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. The information is then used to access important accounts and can result in identity theft and financial loss.

Kali Linux has many tools for doing social engineering attacks. Setoolkit is the most powerful tool in Kali Linux to do a social engineering attacks over the same and different networks. 

Social Engineering over the same network requires the local IP address of your system just like this one 192.168.1.2. Now how you can get your local IP address from your system. To find local IP address just open up your terminal in Linux distribution:

Type: ifconfig wlan0 (if you are using WiFi)
Type: ifconfig eth0 (if you are using eth0)
Type: ifconfig (It display all information about your network)

Now you've another thing to do is that you just have to clone a web page you wanna clone like Facebook, g-mail, twitter etc. Similarly, If you wanna clone a facebook page so for this you just have to type www.facebook.com over your system's terminal for cloning a login page for Social Engineering attack.Still If you don't know how to do that so don't be worry, I did all the process practically in the below just go down and watch it!