Sunday, May 27, 2018
Home Tags Hashes

Tag: hashes

john

John The Ripper

Must Need

nmap

NMAP 7.0 Released

NMAP 7.0 What's New ? Nmap has always been the king of scanners for a Security professional. After 18 years from it's first release, the...
metasploit

Metasploit Framework

Metasploit - "The de facto of Exploit Development", "The Attackers Playbook", "The one-stop Penetration Testing Solution" and it goes on.... Metasploit is a framework of...
DVHMA

DVHMA – Damn Vulnerable Hybrid Mobile Application

Damn Vulnerable Hybrid Mobile App or DVHMA is a hybrid mobile app for Android that deliberately contains vulnerabilities. Its motivation is to empower security...
CredSniper

CredSniper – Phishing Framework Written Python and Jinja2

Easily launch a new phishing site fully presented with SSL and capture credentials along with 2FA tokens using CredSniper. The API provides secure access...
Instagram-Py

Instagram-Py – Python Script To Brute Force Attack

Instagram-Py is a straightforward python script to perform brute force attack against Instagram , this script can sidestep login restricting on wrong passwords ,...
CloudFrunt

CloudFrunt Tool For Identifying Misconfigured CloudFront Domains

CloudFrunt is a tool for identifying misconfigured CloudFront domains. CloudFront is a Content Delivery Network (CDN) gave by Amazon Web Services (AWS). CloudFront clients...
Air-Hammer

Air-Hammer – A Online Brute-Force Attack Tool

Air-Hammer is an online brute-force attack tool for use against WPA Enterprise networks. Despite the fact that WPA Enterprise is regularly viewed as "more...