Monday, August 20, 2018
Home Tags Security

Tag: security

Must Need

Sqlmap

SQLMAP – Enumeration of Databases & Users from Vulnerable Web Forms

Sqlmap is a database assessment tool which pentesters & security researchers can use to enumerate databases of various types. Sqlmap automates a normal &...
WinPirate

WinPirate : Automated Sticky Keys Hack From A Bootable USB

Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here's the plan. We create a way to automate doing...
FBHT

FBHT – Facebook Hacking Tool

FBHT stand for Facebook Hacking Tool. Python - -version 2.7.3 (Windows/Linux) IMPORTS FBHT Selenium Matplotlib-1.2.1 Networkx-1.8.1 Numpy-1.7.1 Pygraphviz-1.1 Simplejson-3.3.0 Mechanize-0.2.5 Other: gephi-0.8.2-beta (Graphs software) Also Read Ddos2track –...
Hacking Tools

Best Hacking Tools List for Hackers & Security Professionals 2018

A curated list of marvelous Hacking Tools. Hacking Tools are all the more frequently utilized by security businesses to test the vulnerabilities in system...
Frisky

Frisky – Tools To Assist Binary App Reversing & Augmentation

Frisky is an instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS. Most, if not all, recently tested...
Whatsapp_Automation

Whatsapp_Automation : Collection Of APIs Interact With WhatsApp Running In An...

Whatsapp_Automation is a collection of APIs that interact with WhatsApp messenger running in an Android emulator, allowing developers to build projects that automate sending...
onion

Onion nmap To Scan Hidden Onion Services

Utilize nmap to scan hidden "onion" benefits on the Tor network. Insignificant picture in view of elevated, utilizing proxychains to wrap nmap. Tor and...