DVIA – Damn Vulnerable iOS Application

0
Damn Vulnerable iOS App or DVIA is an iOS application that is damn vulnerable. Its fundamental objective is to give a stage to portable...

Use a Fake image.jpg ‘FakeImageExploiter’ to Exploit Targets

0
FakeImageExploiter stores all records in apache2 webroot, zips (.zip) the specialist, begins apache2 and metasploit services(handler), and gives a URL to send to target...

WinPirate : Automated Sticky Keys Hack From A Bootable USB

0
Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here's the plan. We create a way to automate doing...

Malicious Apps Change Their Name To Be Back On Google Play Store

0
The Google Play Store has a notoriety for being the most secure place online to get Android applications, and Google completes a great job...

Linset : Hack WPA WPA2 Using This Tool

0
Linset Is Not a Social Engineering Tool. Most importantly, remarked this is a task for instructive purposes that have served to me to be...

CredSniper – Phishing Framework Written Python and Jinja2

0
Easily launch a new phishing site fully presented with SSL and capture credentials along with 2FA tokens using CredSniper. The API provides secure access...

XVNA – Extreme Vulnerable Node Application

0
XVNA is an extraordinary vulnerable node application coded in Nodejs(Expressjs)/MongoDB that causes security aficionados to learn application security. It's not advised to have this...

DVHMA – Damn Vulnerable Hybrid Mobile Application

0
Damn Vulnerable Hybrid Mobile App or DVHMA is a hybrid mobile app for Android that deliberately contains vulnerabilities. Its motivation is to empower security...

FBHT – Facebook Hacking Tool

0
FBHT stand for Facebook Hacking Tool to hack facebook inbox. Python - -version 2.7.3 (Windows/Linux) IMPORTS FBHT Selenium Matplotlib-1.2.1 Networkx-1.8.1 Numpy-1.7.1 Pygraphviz-1.1 Simplejson-3.3.0 Mechanize-0.2.5 Other: gephi-0.8.2-beta...

Hooker : Automated Dynamic Analysis of Android Applications

0
Hooker is an opensource venture for dynamic analyses of Android applications. This venture gives different devices and applications that can be use to consequently...
Command-Line Techniques for Listing Linux Users

Command-Line Techniques for Listing Linux Users

0
Linux offers powerful command-line tools for system administrators to view and manage user accounts. Knowing how to list users efficiently helps you audit your...
Exploring User Management in Linux Systems

Exploring User Management in Linux Systems

0
User management is a critical aspect of Linux administration. Each user in a Linux system has specific permissions, roles, and files associated with their...
How to List Users in Linux

How to List Users in Linux

0
Managing users is an essential part of Linux system administration. Knowing how to list all users helps you monitor system access, manage permissions, and...
Nmap Cheat Sheet

Nmap cheat sheet for beginners

0
Nmap (Network Mapper) is a free tool that helps you find devices on a network, discover open ports, and identify services running on those...
MCP

Understanding the Model Context Protocol (MCP) and How It Works

0
Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open standard that enables AI applications, such as large language models,...