Wednesday, August 22, 2018
Home Tags FBHT

Tag: FBHT

Must Need

PCILeech

PCILeech – Direct Memory Access (DMA) Attack Software

PCILeech uses PCIe hardware devices to read and write from the target system memory. This is achieved by using DMA over PCIe. No drivers...
Rootless Jailbreakd

Rootless Jailbreakd – Jailbreakd Offering Some More Functionality To The Jailbreak

Rootless Jailbreakd is A small jailbreakd offering some more functionality to the jailbreak. Uses CPDisctributedMessageCenter. To compile you need theos (why? cus why not?...
FakeImageExploiter

Use a Fake image.jpg ‘FakeImageExploiter’ to Exploit Targets

FakeImageExploiter stores all records in apache2 webroot, zips (.zip) the specialist, begins apache2 and metasploit services(handler), and gives a URL to send to target...
PacVim

PacVim – A Game That Teaches You Vim Commands

PacVim is a free open source, text-based game that teaches you vim commands in a simple and fun manner.  In spite of the fact...
Autovpn

Autovpn – Connect to a VPN in a Country of your...

AutoVpn is a tool to automatically connect you to a random VPN in a country of your choice. It uses openvpn to connect you...
BootStomp

BootStomp – A Bootloader Vulnerability Bug Finder

BootStomp is a tool to boot-loader vulnerability bug finder. It will look different for two different class of bugs: memory corruption and state storage...
Cr3dOv3r

Cr3dOv3r – Know The Dangers Of Credential Reuse Attacks

Cr3dOv3r is know as the dangers of credential reuse attacks. It would be your best friend in credential reuse attacks. You give Cr3dOv3r an...