Facebook
Instagram
Twitter
Youtube
Sign in
KaliLinux
Tech today
Android
Apple
Geeks
Linux
Applications
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Password recovery
Recover your password
your email
Search
Sign in / Join
Events
Guides
Advertise
Buy Now
Facebook
Instagram
Twitter
Youtube
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Kali Linux Tutorials
KaliLinux
Tech today
software
Hyperswitch : Revolutionizing Digital Payments With Open-Source Flexibility
Cyber security
ZKsync Era : A ZK Rollup For Scaling Ethereum
Cyber security
Vaultwarden : The Efficient Self-Hosted Alternative To Bitwarden
Cyber security
Namada : Revolutionizing Blockchain Privacy And Interoperability
Cyber security
multi-socifi-v2 : Powering Real-Time Multiplayer Poker Games
All
Android
Apple
Geeks
Linux
Cyber security
Zapper : A Linux Tool For Command Line Privacy
Applications
GoDoxy : A Lightweight Reverse Proxy Tool
Exploitation Tools
Understanding Userland Exec : A Comprehensive Overview
Applications
Niri : Revolutionizing Window Management With Scrollable Tiling On Wayland
Applications
Overview Of CPAL : Cross-Platform Audio Library
Applications
Applications
Delta Lake : Enhancing Data Lakes With ACID Transactions And Performance Optimization
Applications
GoDoxy : A Lightweight Reverse Proxy Tool
Applications
Niri : Revolutionizing Window Management With Scrollable Tiling On Wayland
Applications
Overview Of CPAL : Cross-Platform Audio Library
Applications
Dioxus : Revolutionizing Cross-Platform Development With Rust
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Home
Tags
DVHMA
Tag: DVHMA
Kali Linux
DVHMA – Damn Vulnerable Hybrid Mobile Application
R K
-
May 15, 2018
0
APPLICATIONS
Py3webfuzz : A Python3 Module To Assist In Fuzzing Web Applications
R K
-
November 16, 2020
PKINITtools : Tools For Kerberos PKINIT And Relaying To AD CS
R K
-
October 19, 2021
Operation Archive – Documenting The Dark Web’s Takedown
Varshini
-
October 3, 2024
JCS – Joomla Vulnerability For Penetration Testing Component Scanner
R K
-
June 24, 2018
HOT NEWS
4 Next-Generation Security Technologies: SCA, XDR, SAST, and eBPF
Kaladmin
-
December 10, 2022
0
Cyber security
What Are Next-Gen Security Technologies? As businesses increasingly rely on remote access and distributed computing resources, their threat landscape grows. Advances in technology introduce new...