Facebook
Instagram
Twitter
Youtube
Sign in
KaliLinux
Tech today
Android
Apple
Geeks
Linux
Applications
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Password recovery
Recover your password
your email
Search
Sign in / Join
Events
Guides
Advertise
Buy Now
Facebook
Instagram
Twitter
Youtube
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Kali Linux Tutorials
KaliLinux
Tech today
software
Hyperswitch : Revolutionizing Digital Payments With Open-Source Flexibility
Cyber security
ZKsync Era : A ZK Rollup For Scaling Ethereum
Cyber security
Vaultwarden : The Efficient Self-Hosted Alternative To Bitwarden
Cyber security
Namada : Revolutionizing Blockchain Privacy And Interoperability
Cyber security
multi-socifi-v2 : Powering Real-Time Multiplayer Poker Games
All
Android
Apple
Geeks
Linux
Cyber security
Zapper : A Linux Tool For Command Line Privacy
Applications
GoDoxy : A Lightweight Reverse Proxy Tool
Exploitation Tools
Understanding Userland Exec : A Comprehensive Overview
Applications
Niri : Revolutionizing Window Management With Scrollable Tiling On Wayland
Applications
Overview Of CPAL : Cross-Platform Audio Library
Applications
Applications
Delta Lake : Enhancing Data Lakes With ACID Transactions And Performance Optimization
Applications
GoDoxy : A Lightweight Reverse Proxy Tool
Applications
Niri : Revolutionizing Window Management With Scrollable Tiling On Wayland
Applications
Overview Of CPAL : Cross-Platform Audio Library
Applications
Dioxus : Revolutionizing Cross-Platform Development With Rust
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Accessories
Android
Apple
Applications
Blog
Bluetooth
Cyber security
Database Assessment
Exploitation Tools
Forensics
Geeks
Hacking Courses
Hacking Tools
Information Gathering
iphone
Kali Linux
Kali Linux Tools
Linux
Malware
New Post
nsfw
Password Attacks
PCI
Pentesting Tools
Phishing
Post Exploitation
Sec Dictionary
Security Hacker
Sniffing/Spoofing
software
Stress Testing
TECH
Tech today
Tutorials
VPN
Vulnerability Analysis
Web Application Analysis
Wi-Fi
Windows
Wireless Attacks
YECH
Latest
Latest
Featured posts
Most popular
7 days popular
By review score
Random
OdinLdr : Advancing Red Team Stealth And Efficiency With Draugr And Cobalt Strike’s UDRLs
Varshini
-
February 7, 2025
0
HackTheBox AD Machines : Tools And Strategies For Mastering AD Penetration Testing
Varshini
-
February 7, 2025
0
EarlyCascade : Revolutionizing Process Injection To Outmaneuver Endpoint Security
Varshini
-
February 6, 2025
0
Exploitation Tools
Home
Exploitation Tools
Exploitation Tools main menu
Exploitation Tools
Understanding Userland Exec : A Comprehensive Overview
Varshini
-
February 6, 2025
0
Exploitation Tools
DCOMUploadExec : A Tool For Lateral Movement Exploits Using IMsiServer
Varshini
-
February 6, 2025
0
Exploitation Tools
CognitoHunter : A Comprehensive AWS Cognito Analysis Toolkit
Varshini
-
February 5, 2025
0
Exploitation Tools
Exploring The Tools And Functions Of “how2heap”
Varshini
-
February 5, 2025
0
Exploitation Tools
Understanding CVE-2024-12084 And Its Exploitation
Varshini
-
February 5, 2025
0
Exploitation Tools
Relocatable : A Tool For Position Independent Code
Varshini
-
February 4, 2025
0
Exploitation Tools
BOF WinRM Client : Advancing Stealth And Efficiency In Remote System...
Varshini
-
February 4, 2025
0
Exploitation Tools
Understanding And Utilizing The Tomcat – CVE-2024-50379 Proof-of-Concept (PoC)
Varshini
-
February 4, 2025
0
Exploitation Tools
CVE-2024-55591 : Fortinet FortiOS Authentication Bypass Vulnerability
Varshini
-
January 31, 2025
0
Exploitation Tools
Draugr : Advanced Tools For Synthetic Stack Frame Manipulation
Varshini
-
January 31, 2025
0
1
2
3
...
10
Page 1 of 10
APPLICATIONS
Xerror – An Automated Penetration Testing Tool With GUI
Febi
-
January 17, 2023
VuCSA : Vulnerable Client-Server Application – Made For Learning/Presenting
R K
-
November 13, 2022
Install And Secure – A Guide To Using ‘ldeep’ With Kerberos For Advanced Active...
Varshini
-
November 9, 2023
Neurax : A Framework For Constructing Self-Spreading Binaries
R K
-
June 20, 2021
HOT NEWS
magicRecon : A Powerful Shell Script To Maximize The Recon And...
R K
-
June 17, 2021
0
Kali Linux
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving...