Saturday, September 21, 2019
Home SQLMAP – Enumeration of Databases & Users from Vulnerable Web Forms sqlmap2-4

sqlmap2-4

sqlmap

Tables Populating

sqlmap
sqlmap

Must Need

CGPwn

CGPwn – Ubuntu VM For Hardware Hacking, RE and Wargaming

CGPwn is a lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming task. Tools included in CGPwn; Fire up the VM git clone https://github.com/0xM3R/cgPwn cd...
Mimikatz

Mimikatz : A little Tool to Play with Windows Security

Mimikatz is a tool I've made to learn C and make somes experiments with Windows security. Mimikatz : A little...
Metame : Metamorphic Code Engine For Arbitrary Executables

Metame : Metamorphic Code Engine For Arbitrary Executables

Metame is a simple metamorphic code engine for arbitrary executable. Metamorphic code is code that when run outputs a logically equivalent version...
Wildpwn

Wildpwn – Tool Used For Unix Wildcard Attacks

Wildpwn is a Python UNIX wildcard attack tool that helps you generate attacks. It’s considered a fairly old-skool attack vector, but it still works...
Evilginx2

Evilginx2 – Standalone MITM Attack Framework Used For Phishing Login Credentials...

Evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to bypass 2-factor authentication protection. This...
WiFi-Pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

WiFi-Pumpkin is an extremely total system for evaluating Wi-Fi security. The fundamental feature is the capacity to make a phony AP and make Man...
Thc Hydra : Tool To Gain Unauthorised Access From Remote To A System

Thc Hydra : Tool To Gain Unauthorised Access From Remote To...

Number one of the biggest security holes are passwords, as every password security study shows. Thc Hydra is a proof of concept...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout