Tuesday, July 17, 2018
Home SQLMAP – Enumeration of Databases & Users from Vulnerable Web Forms sqlmap2-6

sqlmap2-6

sqlmap

Dumping the target table

sqlmap
sqlmap

Must Need

FBHT

FBHT – Facebook Hacking Tool

FBHT stand for Facebook Hacking Tool. Python - -version 2.7.3 (Windows/Linux) IMPORTS FBHT Selenium Matplotlib-1.2.1 Networkx-1.8.1 Numpy-1.7.1 Pygraphviz-1.1 Simplejson-3.3.0 Mechanize-0.2.5 Other: gephi-0.8.2-beta (Graphs software) Also Read Ddos2track –...
Arping

Arping – To Discover Hosts on a Computer Network

Arping is a computer software tool that is used to discover hosts on a computer network. The program tests whether a given IP address...
Unicorn

Unicorn – Downgrade Attack & Inject Shellcode Straight into Memory

A unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's PowerShell attacks...
reaver

Reaver + PixieWPS – Tool to Bruteforce the WPS of a...

Reaver is a tool to brute-force the WPS of a WIFi router. PixeWPS is a new tool to brute-force the exchanging keys during a...
Hack Windows Installer

Hack Windows Installer For The Hack Typeface

Hack Windows Installer A Hack Windows installer for the Hack typeface. While it may appear like pointless excess to utilize a hack windows installer for fonts,...
lbd

lbd – Tool to Detect Whether a Domain has Load Balancing...

Load balancing(lbd) is the technique used in different services for balancing the load across different servers or NICs. It can be in any form....
WiFiJammer

WiFiJammer – Continuously Jam All Wi-Fi Clients/Routers

WiFiJammer continuously jam all wifi clients and access points within range. The effectiveness of this script is constrained by your wireless card. Alfa cards...