Pular para o conteúdo principal

Whatsapp 47 988618255

Compartilhe

RT : Anatomia do phishing: Como identificar um e-mail falso

Anatomia do phishing: Como identificar um e-mail falso Por  Jaqueline Sousa  • Editado por  Jones Oliveira  |  07/12/2025 às 18:00 Compartilhe: Seu resumo inteligente do mundo tech! Assine a newsletter do Canaltech e receba notícias e reviews sobre tecnologia em primeira mão. E-mail inscreva-se Confirmo que li, aceito e concordo com os  Termos de Uso e Política de Privacidade do Canaltech. Reprodução/Crypto ID A arte de enganar usuários para coletar dados sensíveis, como senhas e informações bancárias, tem um nome para chamar de seu:  phishing . O que é phishing e como se proteger? Smishing e Vishing: o phishing que chega por SMS e ligação de voz Identificado originalmente na época da internet discada, lá nos anos 1990, esse tipo de ataque digital se fortaleceu ao longo das últimas décadas graças aos  avanços tecnológicos , como a popularidade de ferramentas de inteligência artificial (IA), por exemplo, mas sua essência sempre permaneceu a mesma. ...

20 ferramentas de hackers mais populares em 2018

Top 20 Most Popular Hacking Tools in 2018



It is the end of the year and we bring you the most popular tools of 2018 in Kitploit, we ordered the 20 tools that had most visitors from March to December 2018.

For professionals working in information security, many of this tools are the same ones the hackers are using, to understand the holes in your system, you have to be able to see it in the same way that your potential adversaries can see it.

Topics of the tools focus on OSINTInformation GatheringAndroid Hacking ToolsAutomation ToolsPhishing, among others.

Without going into further details, we have prepared a useful list of the most popular tools in Kitploit 2018:


  1. EagleEye - Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles Using Image Recognition And Reverse Image Search

  2. Hijacker v1.5 - All-in-One Wi-Fi Cracking Tools for Android

  3. LOIC 1.0.8 (Low Orbit Ion Cannon) - A network stress testing application

  4. Trape - People tracker on the Internet (The evolution of phishing attacks) OSINT

  5. BlackEye - The Most Complete Phishing Tool, With 32 Templates +1 Customizable

  6. Mercury - A Hacking Tool Used To Collect Information And Use The Information To Further Hurt The Target

  7. VOOKI - Web Application Vulnerability Scanner

  8. Devploit v3.6 - Information Gathering Tool

  9. Tinfoleak v2.4 - The Most Complete Open-Source Tool For Twitter Intelligence Analysis


  10. ANDRAX - The First And Unique Penetration Testing Platform For Android Smartphones

  11. SocialBox - A Bruteforce Attack Framework (Facebook, Gmail, Instagram, Twitter)

  12. Th3Inspector - Tool for Information Gathering

  13. Pure Blood v2.0 - A Penetration Testing Framework Created For Hackers / Pentester / Bug Hunter

  14. Kali Linux 2018.3 Release - Penetration Testing and Ethical Hacking Linux Distribution

  15. Wifite 2.1.0 - Automated Wireless Attack Tool

  16. Infection Monkey - An Automated Pentest Tool

  17. Trackerjacker - Like Nmap For Mapping Wifi Networks You'Re Not Connected To, Plus Device Tracking

  18. BadMod - Detect Website CMS, Website Scanner & Auto Exploiter

  19. Photon - Incredibly Fast Crawler Which Extracts Urls, Emails, Files, Website Accounts And Much More

  20. SocialFish - Ultimate phishing tool with Ngrok integrated


Happy New Year wishes the KitPloit team!

Comentários

Como usar um Agente OSINT IA

Pericia Digital

Ebook

OSINT NEWS NO X

Postagens mais visitadas