Kwetza – Tool To Infect An Existing Android Application With A Meterpreter Payload

0

Kwetza is a tool that allows you to infect an existing Android application with a Meterpreter payload. Python script to inject existing Android applications with a Meterpreter payload. What Kwetza actually do ? Kwetza infects an existing Android application with either custom or default payload templates to avoid detection by antivirus. Kwetza allows you to infect Android applications using the target...

Pemcracker – Tool to crack encrypted PEM files

0

Pemcracker is a tool to crack encrypted PEM files. This tool is inspired by pemcrack by Robert Graham. The purpose is to attempt to recover the password for encrypted PEM files while utilizing all the CPU cores. It still uses high level OpenSSL calls in order to guess the password. As an optimization, instead of continually checking against the PEM...

Crackle – Crack Bluetooth Smart Encryption

0

Crackle cracks BLE Encryption. It exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force the TK (Temporary Key). With the TK and other data collected from the pairing process, the STK (Short Term Key) and later the LTK (Long Term Key) can be collected. With the STK and LTK, all...

WpCrack – Simple Tool For Brute Force WordPress

0

Wpcrack is simple tool for brute force Wordpress. It was made by ZoneSec team, using python language. Installation WpCrack git clone https://github.com/MrSqar-Ye/wpCrack.git Also Read CSS Keylogger – Chrome Extension And Express Server That Exploits Keylogging Abilities Of CSS WordPress hash cracker Video

CSS Keylogger – Chrome Extension And Express Server That Exploits Keylogging Abilities Of CSS

0

CSS Keylogger is a Chrome extension and Express server that exploits keylogging abilities of CSS. Using a simple script one can create a css file that will send a custom request for every ASCII character. Setup Chrome extension Download repository git clone https://github.com/maxchehab/CSS-Keylogging Visit chrome://extensions in your browser (or open up the Chrome menu by clicking the icon to the...

Volatility Framework – Volatile memory extraction utility framework

0

The Volatility Framework is a totally open accumulation of tools, executed in Python under the GNU General Public License, for the extraction of computerized antiquities from unstable memory (RAM) tests. The extraction techniques are performed totally autonomous of the framework being researched yet offer visibilty into the runtime state of the framework. The system is planned to acquaint individuals with...

PwnAdventure3 – Game Intentionally Vulnerable To Hacks

0

PwnAdventure3: Pwnie Island is a limited-release, first-person, true open-world MMORPG set on a beautiful island where anything could happen. That's because this game is intentionally vulnerable to all kinds of silly hacks! Flying, endless cash, and more are all one client change or network proxy away. Are you ready for the mayhem?! Official Site click here Also Read Tallow – Transparent Tor...

chntpw – Windows Password, Account Forensics & Change User Password

0

chntpw is a Kali Linux tool that can be used to edit the windows registry, reset a users password, and promote a user to administrator, as well as several other useful options. Using chntpw is a great way to reset a Windows Password or otherwise gain access to a Windows machine when you don’t know what the password it chntpw is...

Reaver + PixieWPS – Tool to Bruteforce the WPS of a WiFi Router

0

Reaver is a tool to brute-force the WPS of a WIFi router. PixeWPS is a new tool to brute-force the exchanging keys during a WPS transaction. First, let's get to know what is WPS WPS is Wifi Protected Setup designed to quickly & easily authenticate a client to an AP mainly aimed for home users. Basically in WPS, the Access...

PEEPDF : A One Stop Tool for PDF Document Forensic Analysis

0
PEEPDF

Peepdf is a tool for the forensic analysis of pdf documents. Most social engineering attacks use a malicious PDF document embedded with java scripts & shell-codes. It can analyze suspicious objects & data streams within a PDF document. With some extensions installed, a security researcher can analyze the java-scripts & shell-codes in detail. Precisely some of the top features of...