MITM : Man-in-the-middle Router

6 years ago

Turn any linux PC into an open Wi-Fi organize that quietly mitm or Man-in-the-middle all http activity. Keeps running inside a…

WiFi Password Decryptor Software To Recover Wireless Password

6 years ago

WiFi Password Decryptor is the FREE software to in a flash recover Wireless record passwords put away on your framework.…

How To Hack Android Device using Python Scripts ?

6 years ago

Ever think about how awful folks hack Android gadgets? Or on the other hand how they just figure out how…

Metasploit getwlanprofiles – Simple Script To Download Wireless Profiles From Windows Client

6 years ago

Metasploit getwlanprofiles is a Meterpreter script which when kept running against Windows 7 or Vista boxes will extract and download…

WinPirate – Automated Sticky Keys Hack

6 years ago

We create a way to automate doing the window sticky keys hack from a bootable USB. Then, we automate getting…

DVIA – Damn Vulnerable iOS Application

6 years ago

Damn Vulnerable iOS App or DVIA is an iOS application that is damn vulnerable. Its fundamental objective is to give…

Use a Fake image.jpg ‘FakeImageExploiter’ to Exploit Targets

6 years ago

FakeImageExploiter stores all records in apache2 webroot, zips (.zip) the specialist, begins apache2 and metasploit services(handler), and gives a URL…

WinPirate : Automated Sticky Keys Hack From A Bootable USB

7 years ago

Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here's the plan. We create a…

Malicious Apps Change Their Name To Be Back On Google Play Store

7 years ago

The Google Play Store has a notoriety for being the most secure place online to get Android applications, and Google…

Linset : Hack WPA WPA2 Using This Tool

7 years ago

Linset Is Not a Social Engineering Tool. Most importantly, remarked this is a task for instructive purposes that have served…