Wednesday, September 18, 2019

Security Hacker

Security Hacker

Home Security Hacker
KBD-Audio

KBD-Audio : Tools For Capturing & Analysing Keyboard Input Paired With Microphone Capture

KBD-Audio is a collection of command-line and GUI tools for capturing and analyzing audio data. The most interesting tool is...

Sliver : Implant Framework

Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants...
UBoat

UBoat – A POC HTTP Botnet Project

UBoat HTTP is a POC HTTP Botnet designed to replicate a full weaponized commercial botnet. UBoat Uses Coded in C++ with...
DDoS

Top 5 DDoS Attacking Tools For Linux,Windows & Android

DDOS or Distributed Denial of Service Attack is the most strong version of  DOS attack. In this, many...
Munin

Munin – Online Hash Checker For Virustotal & Other Services

Munin is a online hash checker utility that retrieves valuable information from various online sources The current version of Munin queries...
Lynis

Lynis : Security Auditing Tool for Unix/Linux Systems

Lynis is a security auditing tool for UNIX derivatives like Linux, macOS, BSD, Solaris, AIX, and others....
Lightbulb Framework

Lightbulb Framework : Tools For Auditing WAFS

LightBulb Framework is an open source python framework for auditing web application firewalls and filters. LightBulb Framework Synopsis The framework consists of two main...
Apache Struts

Apache Struts Version 3 : Tool To Exploit 3 RCE Vulnerabilities On ApacheStruts

Apache Struts Version 3 is a tool to exploit 3 RCE vulnerabilities on ApacheStruts. Script contains the fusion of 3 vulnerabilities...
DCOMrade

DCOMrade : Powershell script for enumerating vulnerable DCOM Applications

DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow...

PasteJacker : Hacking Systems With The Automation Of PasteJacking Attacks

PasteJacker the main purpose of the tool is automating (PasteJacking/Clipboard poisoning/whatever you name it) attack with collecting all the known...

Must Need

Intensio Obfuscator : Obfuscate A Python Code 2.x & 3.x

Intensio Obfuscator : Obfuscate A Python Code 2.x & 3.x

Intensio Obfuscator is an obfuscate a python code 2.x and 3.x. Takes a python source code and transform it into an obfuscated...
Crashcast

Crashcast-Exploit : Tool To Mass Play YouTube Video, Terminate Apps &...

CRASHCAST mass-exploit tool allows you to mass play any YouTube video, remotely terminate apps, and rename Chromecast device(s) obtained from Shodan.io.
PasteHunter : Scanning Pastebin With Yara Rules

PasteHunter : Scanning Pastebin With Yara Rules

PasteHunter is a python3 application that is designed to query a collection of sites that host publicly pasted data. For all the...
LAPSToolkit

LAPSToolkit : Tool to Audit & Attack LAPS Environments

LAPSToolkit functions written in PowerShell that leverage PowerView to audit and attack Active Directory environments that have deployed Microsoft's Local Administrator Password...
ADAPT

ADAPT : Tool That Performs Automated Penetration Testing for WebApps

ADAPT is a tool that performs Automated Dynamic Application Penetration Testing for web applications. It is designed to increase accuracy, speed,...
Spyse : Python API Wrapper & Command-Line Client For The Tools Hosted On Spyse.com

Spyse : Python API Wrapper & Command-Line Client For The Tools...

Spyse is a developer of complete DAAS (Data-As-A-Service) solutions for Internet security professionals, corporate and remote system administrators, SSL / TLS encryption...
GodOfWar

GodOfWar : Malicious Java WAR Builder With Built-In Payloads

GodOfWar is a command-line tool to generate war payloads for penetration testing / red teaming purposes, written in ruby.

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout