Sunday, July 21, 2019

Exploitation Tools

Exploitation Tools main menu

Exploitation Tools

Home Exploitation Tools
Exploitation Tools main menu

Sliver : Implant Framework

Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants...

Hacking With BeEF- Fake Flash Update, Add-ons Installation, Stealing Facebook & Gmail Credentials

Hacking With BeEf, The Browser Exploitation Framework is a penetration testing tool which focuses strongly on web browsers....

WPScan – Checks Vulnerabilities and Spots Security Issues

WPScan effectively scans your WordPress website and checks the vulnerabilities within the core version, plugins, themes, etc helping...
Metasploit Framework

Metasploit Framework Part 2 – msfconsole & Exploiting Vulnerable Linux System

Msfconsole provides a handy all-in-one interface to almost every option and setting available in the Framework; it’s like a one-stop...
Metasploit Framework

Metasploit Framework – A Beginner’s Guide for Penetration Testing, Exploit Development and Vulnerability Research

Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we can regard it as a...
Vayne-RaT

Vayne-RaT Free and Open Source Remote Administration

Vayne-RaT is Free and Open Source Remote Administration Tool Coded In C#. Android has emerged because the high mobile software package,...

Must Need

Androguard

Androguard : Reverse Engineering, Malware & Goodware Analysis of Android Applications

Androguard is a eeverse engineering, malware and goodware analysis of Android applications. It is a full python tool to play with Android...
Salsa Tools : ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP & AV Bypass, AMSI Patched

Salsa Tools : ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP & AV Bypass, AMSI Patched

Salsa Tools is a collection of three different tools that combined, allows you to get a reverse shell on steroids in...
Thc Hydra : Tool To Gain Unauthorised Access From Remote To A System

Thc Hydra : Tool To Gain Unauthorised Access From Remote To...

Number one of the biggest security holes are passwords, as every password security study shows. Thc Hydra is a proof of concept...
Horn3t : Powerful Visual Subdomain Enumeration at the Click of a Mouse

Horn3t : Powerful Visual Subdomain Enumeration at the Click of a...

Horn3t is your number one tool for exploring subdomains visually. Tested on Windows 10 and Debian with Google Chrome/Chromium 73.
Drozer 2.4.4

Drozer v2.4.4 – The Leading Security Assessment Framework For Android

Drozer 2.4.4  is the leading security testing framework for Android. Drozer allows you to search for security vulnerabilities in apps and devices by assuming...
PHP

PHP : Security Check List 2019

PHP : Hypertext Preprocessor is a web-based, server-side, multi-use, general-purpose, scripting and programming language that can be embedded in HTML....
GatherContacts

GatherContacts – A Burp Suite Extension To Pull Employee Names From...

GatherContacts is a Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results. As part of reconnaissance when performing a penetration...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout