HackingTool – ALL IN ONE Hacking Tool For Hackers
This project still in BETA so you may face problems, Please open an issue so i'll fix them..!!Hackingtool MenuAnonSurfInformation GatheringPassword...
This project still in BETA so you may face problems, Please open an issue so i'll fix them..!!Hackingtool MenuAnonSurfInformation GatheringPassword...
FastNetMon - A high performance DoS/DDoS load analyzer built on top of multiple packet capture engines (NetFlow, IPFIX, sFlow, AF_PACKET,...
GoGhost is a High Performance, lightweight, portable Open Source tool for mass SMBGhost Scan.InstallationYou can download Windows Binary or Linux...
Spam is a common nuisance for users of the Internet. However, it is not just annoying - these messages may...
Server-side template injection is when an attacker is able to use native template syntax to inject a malicious payload into...
A (Still in Development) monitoring browser extension for pages acting as bad boys.NB: This is the code repository of the...
This is a simple script that will generate a specific or all shellcodes for CTFs using the VPN IP address...
The KITT Penetration Testing Framework was developed as an open source solution for pentesters and programmers alike to compile the...
Can a more complex comparison be made? AI and voice assistance are similar to a seeing-eye dog. Throwing the duties...
IS Raid is a native IIS module that abuses the extendibility of IIS to backdoor the web server and carry...
2020-06-06 Update: this trick no longer works on the latest builds of Windows 10 Insider Preview. This means that, although...
Despite the summer season entering full swing, we know cyber-threats take no vacations. That’s why our team has been working...
This post is part two of a two-part blog series on policy customization in InsightVM, Rapid7’s vulnerability risk management solution.In...
BaseCrack is a tool written in Python that can decode all alphanumeric base encoding schemes. This tool can accept single...
A quick way to generate various "basic" Meterpreter payloads via msfvenom (part of the Metasploit framework).AboutMSFvenom Payload Creator (MSFPC) is...
This blog post is part two of a three-part series on macro authentication. Be sure to catch up on part...
kube-bench is a Go application that checks whether Kubernetes is deployed securely by running the checks documented in the CIS...
Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../install :sudo pip3 install -r requirements.txtEvilNet Attack NetworkScan...
Overview of the SAML authentication vulnerability on PAN-OS devicesOn Monday, June 29, 2020, Palo Alto released details on CVE-2020-2021, a...
When working on embedded hardware, there is often a need to connect into the printed circuit board (PCB) for testing....
Undetectable Reverse shell & Xor encrypting with custom KEY(FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,...(PYTHON 3)Undetectable Reverse shell (Metasploit...
BSF provides a discrete simulation environment to implement and extend peer-to-peer botnets, tweak their settings and allow defenders to evaluate...
Espionage is a network packet sniffer that intercepts large amounts of data being passed through an interface. The tool allows...
Capture user screenshots using shortcut file (Bypass SmartScreen/Defender). Suport Multi-monitorLegal disclaimer:Usage of ScreenSpy for attacking targets without prior mutual consent...