Kali Linux

Metasploit getwlanprofiles – Simple Script To Download Wireless Profiles From Windows Client

Metasploit getwlanprofiles is a Meterpreter script which when kept running against Windows 7 or Vista boxes will extract and download…

6 years ago

WinPirate – Automated Sticky Keys Hack

We create a way to automate doing the window sticky keys hack from a bootable USB. Then, we automate getting…

6 years ago

DVIA – Damn Vulnerable iOS Application

Damn Vulnerable iOS App or DVIA is an iOS application that is damn vulnerable. Its fundamental objective is to give…

6 years ago

Use a Fake image.jpg ‘FakeImageExploiter’ to Exploit Targets

FakeImageExploiter stores all records in apache2 webroot, zips (.zip) the specialist, begins apache2 and metasploit services(handler), and gives a URL…

6 years ago

WinPirate : Automated Sticky Keys Hack From A Bootable USB

Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here's the plan. We create a…

6 years ago

Malicious Apps Change Their Name To Be Back On Google Play Store

The Google Play Store has a notoriety for being the most secure place online to get Android applications, and Google…

6 years ago

Linset : Hack WPA WPA2 Using This Tool

Linset Is Not a Social Engineering Tool. Most importantly, remarked this is a task for instructive purposes that have served…

6 years ago

CredSniper – Phishing Framework Written Python and Jinja2

Easily launch a new phishing site fully presented with SSL and capture credentials along with 2FA tokens using CredSniper. The…

6 years ago

XVNA – Extreme Vulnerable Node Application

XVNA is an extraordinary vulnerable node application coded in Nodejs(Expressjs)/MongoDB that causes security aficionados to learn application security. It's not…

6 years ago

DVHMA – Damn Vulnerable Hybrid Mobile Application

Damn Vulnerable Hybrid Mobile App or DVHMA is a hybrid mobile app for Android that deliberately contains vulnerabilities. Its motivation…

6 years ago