WinPirate : Automated Sticky Keys Hack From A Bootable USB

0

Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here's the plan. We create a way to automate doing the sticky keys windows hack from a bootable USB which we can call as WinPirate. Then, we automate getting as many saved passwords as possible, drop a listener, and delete all traces that we were...

Malicious Apps Change Their Name To Be Back On Google Play Store

0

The Google Play Store has a notoriety for being the most secure place online to get Android applications, and Google completes a great job of encouraging clients to restrain presentation to malware and different dangers by arranging their smartphones to preclude side-loading and alternative app markets in the Android Settings. This malware "Android.Reputation.1" shows up on the Play Store hidden...

Linset : Hack WPA WPA2 Using This Tool

0

Linset Is Not a Social Engineering Tool. Most importantly, remarked this is a task for instructive purposes that have served to me to be more in contact with the universe of programming and Wireless. It is precluded under any conditions the utilization this tool in foreign Wireless Networks! How Linset works Scan the networks and Select network. Capture handshake (can be...

CredSniper – Phishing Framework Written Python and Jinja2

0

Easily launch a new phishing site fully presented with SSL and capture credentials along with 2FA tokens using CredSniper. The API provides secure access to the currently captured credentials which can be consumed by other applications using a randomly generated API token. CredSniper Benefits Fully supported SSL via Let's Encrypt Exact login form clones for realistic phishing Any number of...

XVNA – Extreme Vulnerable Node Application

0

XVNA is an extraordinary vulnerable node application coded in Nodejs(Expressjs)/MongoDB that causes security aficionados to learn application security. It's not advised to have this application online as it is proposed to be Vulnerable. We have a tendency to propose facilitating this application in local setting and honing your application security skills with any tools of your own choice. It's...

DVHMA – Damn Vulnerable Hybrid Mobile Application

0

Damn Vulnerable Hybrid Mobile App or DVHMA is a hybrid mobile app for Android that deliberately contains vulnerabilities. Its motivation is to empower security experts to test their tools and techniques legitimately, enable developers to better comprehend the normal pitfalls in developing hybrid mobile apps securely. This application is created to examine pitfalls in developing hybrid apps, e.g., utilizing Apache...

FBHT – Facebook Hacking Tool

0

FBHT stand for Facebook Hacking Tool to hack facebook inbox. Python - -version 2.7.3 (Windows/Linux) IMPORTS FBHT Selenium Matplotlib-1.2.1 Networkx-1.8.1 Numpy-1.7.1 Pygraphviz-1.1 Simplejson-3.3.0 Mechanize-0.2.5 Other: gephi-0.8.2-beta (Graphs software) Also Read Ddos2track – Script To Avoid HTTP Floods Attacks Recomendation Use setuptools for the dependencies S.O Working on Windows 7 64/32 bits Working on Kali Linux (Yeah, sucks) but probably works on the others (deprecated -...

Vayne-RaT Free and Open Source Remote Administration

0

Vayne-RaT is Free and Open Source Remote Administration Tool Coded In C#. Android has emerged because the high mobile software package, we've seen a good rise within the automaton hacking apps for unmoving yet as non-rooted devices. For our readers, we've read the list of the most effective hacking apps for automaton for 2018, which may be employed by a technology...

Hooker : Automated Dynamic Analysis of Android Applications

0

Hooker is an opensource venture for dynamic analyses of Android applications. This venture gives different devices and applications that can be use to consequently capture and adjust any API calls made by a targeted application. It use Android Substrate system to catch these calls and total all their relevant data (parameters, returned values, ...). Gathered data can either be put...

Ddos2track – Script To Avoid HTTP Floods Attacks

0

With Ddos2track tool you can block HTTP Flood Attacks and break down them with a honeypot. THE TOOL SEND YOU AN ADVERTISING EMAIL AFTER DETECT A DDOS ATTACK! To begin with begin the honeypot server (tools/analyze/logger.py). At that point begin the locator (tools/detector/detector.sh) in another window. On the off chance that an attacker attack your server in preconfigured port (80), the indicator will redirect...