Wednesday, October 28, 2020

Security Hacker

Home Security Hacker
Top 3 Best Ways to Track Someone by Cell Phone Number

Top 3 Best Ways to Track Someone by Cell Phone Number

There are many people who know quite well how to track someone by cell phone number, but there...

Sliver : Implant Framework

Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants...
Bandit : Tool Designed To Find Common Security Issues In Python Code

Bandit : Tool Designed To Find Common Security Issues In Python Code

Bandit is a tool designed to find common security issues in Python code. To do this it processes...
Important Reasons Why Hiding Your IP Address is a Good Idea

Important Reasons Why Hiding Your IP Address is a Good Idea

The internet can be a goldmine of information, but if you’re not careful enough, it can also be the reason...
Anevicon

Anevicon : A High-Performant UDP-Based Load Generator

Anevicon is a high-performant traffic generator, designed to be as convenient and reliable as it is possible.
Hacking tools

Most Popular Hacking Tools in 2018

Hacking tools used by security professionals to detect vulnerabilities in network and applications. Here you can find the...
Linux Autopilot

Linux-based Autopilot and Other Technologies in Cars

The popularity of Linux in the world is gaining momentum. This is because in many areas it is...
Netdata

NetData : Real-time Performance Monitoring Tool

Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring...
PowerShellArsenal

PowerShellArsenal : A PowerShell Module Dedicated to Reverse Engineering

PowerShellArsenal is a PowerShell module used to aid a reverse engineer. The module can be used to disassemble...
SQL Injection Tools

Top 5 SQL Injection Tools for PenTest & Hacking

SQL injection is a code injection technique, used to attack data-driven applications that might destroy your database....

Must Need

Zin : A Payload Injector For Bugbounties Written In Go

Zin : A Payload Injector For Bugbounties Written In Go

Zin is a payload Injector For Bugbounties Written In Go. Features
Eviloffice : Inject Macro & DDE Code Into Excel & Word Documents

Eviloffice : Inject Macro & DDE Code Into Excel & Word...

Eviloffice is a tool used to inject macro and DDE code into Excel and Word documents (reverse shell).
Pentest Tools Framework : A Database Of Exploits, Scanners & Tools For Penetration Testing

Pentest Tools Framework : A Database Of Exploits, Scanners & Tools...

Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot...
Should-I-Trust : OSINT Tool To Evaluate Trustworthiness Of A Company

Should-I-Trust : OSINT Tool To Evaluate Trustworthiness Of A Company

Should-I-Trust is a tool to evaluate OSINT signals for a domain. You're part of a review board that's responsible for evaluating new...
AutoSploit and AutoScanner

AutoNSE – Massive NSE AutoSploit and AutoScanner

Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner. The Nmap Scripting Engine (NSE) is one of Nmap's most capable and adaptable features. It enables...
WiFi Hacker : Shell Script For Attacking Wireless Connections Using Built-In Kali Tools

WiFi Hacker : Shell Script For Attacking Wireless Connections Using Built-In...

Wifi hacker is a shell script for attacking wireless connections using built-in kali tools. Supports All Securities (WEP, WPS, WPA, WPA2).
CommandoVM : A Fully Customizable Windows-Based Pentesting Virtual Machine Distribution

CommandoVM : A Fully Customizable Windows-Based Pentesting Virtual Machine Distribution

Welcome to CommandoVM a fully customizable, Windows-based security distribution for penetration testing and red teaming. Installation