Thursday, May 24, 2018
Home Tags Sql injection

Tag: sql injection

Must Need

onion

Onion nmap To Scan Hidden Onion Services

Utilize nmap to scan hidden "onion" benefits on the Tor network. Insignificant picture in view of elevated, utilizing proxychains to wrap nmap. Tor and...
WiFi-Pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

WiFi-Pumpkin is an extremely total system for evaluating Wi-Fi security. The fundamental feature is the capacity to make a phony AP and make Man...

Arping

Arping Arping is a computer software tool that is used to discover hosts on a computer network. The program tests whether a given IP address...
reaver

Reaver + PixieWPS

All about WPS, Reaver, PixieWPS and cracking WPA2 PSK with it. Reaver is a tool to bruteforce the WPS of a WIFi router. PixeWPS is...
stagefright

Stagefright – All you need to know

Find out whether your device is vulnerable & Defend against Stagefright Vulnerability Stagefright is one of the latest large scale vulnerabilities that swept up to...
CredSniper

CredSniper – Phishing Framework Written Python and Jinja2

Easily launch a new phishing site fully presented with SSL and capture credentials along with 2FA tokens using CredSniper. The API provides secure access...
WinPirate

WinPirate : Automated Sticky Keys Hack From A Bootable USB

Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here's the plan. We create a way to automate doing...