Best Hacking Books, Tools & Resources 2018
The mystery of turning into a superior infiltration analyzer, bug abundance seeker or IT proficient is to center around pentesting books as well as...
Best Free Hacking Books PDF Related To Security and Pentesting
E-books security is an articulation that was made when the term digital book was first utilized, possibly around 1999. Here is the list of...
Cangibrina Tool To Obtain Dashboard Of Sites Using Brute-Force
Cangibrina is a multi platform apparatus which means to acquire the Dashboard of sites utilizing brute-force over wordlist, google, nmap, and robots.txt. A quick...
SocialFish To Easily And Quickly Create Phishing Sites
Ultimate phishing tool with Ngrok integrated. Using this tool anyone can easily and quickly create a phishing sites. The utilization of the SocialFish is COMPLETE...
Wifiphisher Can Attack Wi-Fi By Unknowingly Connecting To An Attacker-Controlled Access Point
Wifiphisher is a security device that performs Wi-Fi programmed affiliation attack to drive wireless customers to unwittingly interface with an attacker-controlled Access Point. It...
Best Hacking Tools List for Hackers & Security Professionals 2018
A curated list of marvelous Hacking Tools. Hacking Tools are all the more frequently utilized by security businesses to test the vulnerabilities in system...
E013 – WiFi Password Stealer For Microsoft Windows
A little VBScript E013 that steal Wifi passwords from Windows. Into the file WifiName.txt you can see the password of every saved wifi available on...
WiFi Bruteforcer – Android Application To Brute Force WiFi Passwords
WiFi Bruteforcer is an android application to brute force WiFi passwords without requiring a rooted device.
WARNING: This project is still under development and by...
NETATTACK – Scan And Attack Wireless Networks
The NETATTACK or netattack.py is a python script that enables you to examine your local area WiFi Networks and perform deauthentification attacks. The viability...
WMD – Weapon of Mass Destruction
WMD is a python tool with an accumulation of IT security software. The product is incapsulated in "modules". The modules consists of unadulterated python...