Wednesday, August 22, 2018

Exploitation Tools

Exploitation Tools main menu

Exploitation Tools

Home Exploitation Tools
Exploitation Tools main menu

No posts to display

Must Need

WinPirate

WinPirate : Automated Sticky Keys Hack From A Bootable USB

Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here's the plan. We create a way to automate doing...
Rootstealer

Rootstealer – Trick To Inject Commands On Root Terminal

Rootstealer is an example of new attack using X11. This tool is used to detect when linux users open terminal with root and inject...
lbd

lbd – Tool to Detect Whether a Domain has Load Balancing...

Load balancing(lbd) is the technique used in different services for balancing the load across different servers or NICs. It can be in any form....
GoldenEye

GoldenEye – GoldenEye Layer 7 DoS Test Tool

GoldenEye is an python app for SECURITY TESTING PURPOSES ONLY. GoldenEye is a HTTP DoS Test Tool. Attack Vector exploited: HTTP Keep Alive +...
Man-in-the-middle

MITM : Man-in-the-middle Router

Turn any linux PC into an open Wi-Fi organize that quietly mitm or Man-in-the-middle all http activity. Keeps running inside a Docker container utilizing hostapd,...
Droid Hunter

Droid Hunter – Android Application Vulnerability Tool

Droid Hunter Android application vulnerability analysis and Android pentest tool. App info check Baksmaling android app Decompile android app Extract class file Extract java...

WarChild – Denial Of Service Testing Suite Made For Analyzing

Warchild is a denial of service testing suite made for analyzing the strength of your website against different kinds of denial of service attacks...