FakeImageExploiter stores all records in apache2 webroot, zips (.zip) the specialist, begins apache2 and metasploit services(handler), and gives a URL…
Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here's the plan. We create a…
The Google Play Store has a notoriety for being the most secure place online to get Android applications, and Google…
Linset Is Not a Social Engineering Tool. Most importantly, remarked this is a task for instructive purposes that have served…
Easily launch a new phishing site fully presented with SSL and capture credentials along with 2FA tokens using CredSniper. The…
XVNA is an extraordinary vulnerable node application coded in Nodejs(Expressjs)/MongoDB that causes security aficionados to learn application security. It's not…
Damn Vulnerable Hybrid Mobile App or DVHMA is a hybrid mobile app for Android that deliberately contains vulnerabilities. Its motivation…
FBHT stand for Facebook Hacking Tool to hack facebook inbox. Python - -version 2.7.3 (Windows/Linux) IMPORTS FBHT Selenium Matplotlib-1.2.1 Networkx-1.8.1…
Vayne-RaT is Free and Open Source Remote Administration Tool Coded In C#. Android has emerged because the high mobile software…
Hooker is an opensource venture for dynamic analyses of Android applications. This venture gives different devices and applications that can…