Saturday, July 11, 2020

Security Hacker

Home Security Hacker
Top 3 Best Ways to Track Someone by Cell Phone Number

Top 3 Best Ways to Track Someone by Cell Phone Number

There are many people who know quite well how to track someone by cell phone number, but there...

Sliver : Implant Framework

Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants...
Bandit : Tool Designed To Find Common Security Issues In Python Code

Bandit : Tool Designed To Find Common Security Issues In Python Code

Bandit is a tool designed to find common security issues in Python code. To do this it processes...
Important Reasons Why Hiding Your IP Address is a Good Idea

Important Reasons Why Hiding Your IP Address is a Good Idea

The internet can be a goldmine of information, but if you’re not careful enough, it can also be the reason...
Anevicon

Anevicon : A High-Performant UDP-Based Load Generator

Anevicon is a high-performant traffic generator, designed to be as convenient and reliable as it is possible.
Hacking tools

Most Popular Hacking Tools in 2018

Hacking tools used by security professionals to detect vulnerabilities in network and applications. Here you can find the...
Linux Autopilot

Linux-based Autopilot and Other Technologies in Cars

The popularity of Linux in the world is gaining momentum. This is because in many areas it is...
Netdata

NetData : Real-time Performance Monitoring Tool

Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring...
PowerShellArsenal

PowerShellArsenal : A PowerShell Module Dedicated to Reverse Engineering

PowerShellArsenal is a PowerShell module used to aid a reverse engineer. The module can be used to disassemble...
SQL Injection Tools

Top 5 SQL Injection Tools for PenTest & Hacking

SQL injection is a code injection technique, used to attack data-driven applications that might destroy your database....

Must Need

Xeexe : Undetectable & Xor Encrypting With Custom KEY

Xeexe : Undetectable & Xor Encrypting With Custom KEY

Xeexe is a undetectable Reverse shell & Xor encrypting with custom KEY(FUD Metasploit Rat) bypass Top Antivirus like BitDefender, Malwarebytes, Avast, ESET-NOD32,...
CANalyzat0r

Security Analysis Toolkit For Car Protocols – CANalyzat0r

CANalyzat0r is a Python software project built from scratch with new ideas for analysis mechanisms. Why CANalyzat0r?
Nessus Map : Parse Nessus File(s) & Shows Output In Interactive UI

Nessus Map : Parse Nessus File(s) & Shows Output In Interactive...

Nessus Map parse .nessus file(s) and shows output in interactive User Interface. It just works by creating XML directory in Nessus_Map home...
Vboxdie Cracker

Vboxdie Cracker – Virtual Box Disk Image Encryption Password Cracker

Vboxdie Cracker is a virtual box disk image encryption password cracker. User password is stored using a combination of PBKDF2 and AES-XTS, but they...
Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety of shellcodes to running...
Sandsifter

Sandsifter – The x86 Processor Fuzzer For Hidden Instructions & Hardware...

The sandsifter audits x86 processors for hidden instructions and hardware bugs, by systematically generating machine code to search through a processor's instruction set, and...
Horn3t : Powerful Visual Subdomain Enumeration at the Click of a Mouse

Horn3t : Powerful Visual Subdomain Enumeration at the Click of a...

Horn3t is your number one tool for exploring subdomains visually. Tested on Windows 10 and Debian with Google Chrome/Chromium 73.