PwnAdventure3 – Game Intentionally Vulnerable To Hacks

7 years ago

PwnAdventure3: Pwnie Island is a limited-release, first-person, true open-world MMORPG set on a beautiful island where anything could happen. That's…

chntpw – Windows Password, Account Forensics & Change User Password

7 years ago

chntpw is a Kali Linux tool that can be used to edit the windows registry, reset a users password, and…

Reaver + PixieWPS – Tool to Bruteforce the WPS of a WiFi Router

7 years ago

Reaver is a tool to brute-force the WPS of a WIFi router. PixeWPS is a new tool to brute-force the…

PEEPDF : A One Stop Tool for PDF Document Forensic Analysis

7 years ago

Peepdf is a tool for the forensic analysis of pdf documents. Most social engineering attacks use a malicious PDF document…

Tallow – Transparent Tor for Windows

7 years ago

Tallow is a small program that redirects all outbound traffic from a Windows machine via the Tor anonymity network. Any…

Mail Password Sniffer – Tool To Recover Mail Passwords Passing Through The Network

7 years ago

Mail Password Sniffer is the free Email Password Sniffing and Recovery Software to recuperate mail account passwords going through the…

Best Exploit Development Resources For Simulated Attacks

7 years ago

An exploit development is a bit of programming, a piece of information, or a grouping of commands that exploits a…

Metateta – Automated Tool For Scanning And Exploiting Network Protocols

7 years ago

Metateta is an automated tool for scanning and exploiting network protocols using metasploit and for faster pen testing for large…

How to use Masscan to Enumerate Large Number of Hosts Quickly

7 years ago

Masscan has been around for some time now and already it's in use by pentesters all around. It's a reconnaissance tool which can…

Airbash – A Shell Script For Automated WPA PSK Handshake Capture

7 years ago

Airbash is a POSIX-compliant, completely computerized WPA PSK handshake capture script went for penetration testing. It is perfect with Bash…