Wednesday, July 28, 2021
Home Tags DroidFiles

Tag: DroidFiles

Must Need

Homoglyphs

Homoglyphs – Get Similar Letters, Convert To ASCII, Detect Possible Languages...

Homoglyphs is used to get similar letters, convert to ASCII, detect possible languages and UTF-8 group. Also can say python library for getting it...
Libinjection : SQL / SQLI Tokenizer Parser Analyzer

Libinjection : SQL / SQLI Tokenizer Parser Analyzer

Libinjection is a SQL / SQLI tokenizer parser analyzer. For C and C++PHPPythonLuaJava (external port) (https://github.com/p0pr0ck5/lua-ffi-libinjection) (external port)
Kali Linux 2020.3 Release (ZSH, Win-Kex, HiDPI & Bluetooth Arsenal) – Download Now!!

Kali Linux 2020.3 Release (ZSH, Win-Kex, HiDPI & Bluetooth Arsenal) –...

Its that time of year again, time for another Kali Linux release! Quarter #3 – Kali Linux 20202.3. This release has various...
FOCA : Tool To Find Metadata & Hidden Information In The Documents

FOCA : Tool To Find Metadata & Hidden Information In The...

FOCA is a tool used mainly to find metadata and hidden information in the documents it scans. These documents may be on...
A List Of Services & How To Claim Subdomain With Dangling DNS Records

A List Of Services & How To Claim Subdomain With Dangling...

Subdomain takeover vulnerabilities occur when a subdomain (subdomain.example.com) is pointing to a service (e.g. GitHub pages, Heroku, etc.) that has been removed...
WiFi Hacker : Shell Script For Attacking Wireless Connections Using Built-In Kali Tools

WiFi Hacker : Shell Script For Attacking Wireless Connections Using Built-In...

Wifi hacker is a shell script for attacking wireless connections using built-in kali tools. Supports All Securities (WEP, WPS, WPA, WPA2).
AutoRDPwn

AutoRDPwn – The Shadow Attack Framework

AutoRDPwn is a script created in Powershell and designed to automate the Shadow attack on Microsoft Windows computers. This vulnerability allows a remote attacker...