Wednesday, November 13, 2019
Home Tags PDF Over Word

Tag: PDF Over Word

Must Need

HashPump

HashPump – Tool To Exploit Hash Length Extension Attack In Various...

HashPump is a tool to exploit the hash length extension attack in various hashing algorithms. Currently supported algorithms: MD5, SHA1, SHA256, SHA512. Menu $ hashpump -h HashPump...

fake_router6

Create a rouge ipv6 router in one simple step with fake_router6 fake_router6 is a tool inside THC-IPv6 tools bundled inside Kali linux to test exploit...
CocoaDebug  : iOS Debugging Tool

CocoaDebug : iOS Debugging Tool

CocoaDebug is an iOS debugging tool with the following features; Shake to hide or show the black bubble. (support...
MySQL

MySQL Magic: Dump MySQL Client Password From Memory

I made this just for fun, use for illegal purposes are not allowed. The mysql client read the password, then write this...
ARDT

ARDT : Akamai Reflective DDoS Tool

Attack the origin host behind the Akamai Edge hosts and bypass the DDoS protection offered by Akamai services.
DigiDuck

DigiDuck – Framework for Digiduck Development Boards Running ATTiny85 Processors &...

Framework for Digiduck Development Boards running ATTiny85 processors and micronucleus bootloader! DigiDuck Installation DigiDuck Framework (Referred to as DDF) is really simple to start and setup!...
PoshC2 : Python Server for PoshC2

PoshC2 : Python Server for PoshC2

PoshC2 is a proxy aware C2 framework that utilises Powershell and/or equivalent (System.Management.Automation.dll) to aid penetration testers with red teaming, post-exploitation and lateral movement....