Friday, August 23, 2019
Home Tags Shadow

Tag: shadow

Must Need

Leaked

Leaked – A Checking Tool For Hash Codes And Passwords Leaked

A checking tool for hash codes and passwords leaked. It can work in any OS if they have support Python 3. Leaked Features Check passwords ...
DeepSearch

DeepSearch – Advanced Web Dir Scanner For Bruteforce

DeepSearch is a simple command line tool for bruteforce directories and files in websites. you can also use Dark web browser to surf anonymously. DeepSearch...

The Secret IG Growth Hacks You Haven’t Heard Before

The secret to Instagram success is having as many organic followers as possible. Instagram now boasts of more than one billion subscribers all over...
Recaf

Recaf : A Modern Java Bytecode Editor

Recaf is an easy to use modern Java bytecode editor based on Objectweb's ASM. No more hassling with the constant pool...
SharpSploit

SharpSploit – A .NET Post-Exploitation Library Written in C#

SharpSploit is a .NET post-exploitation library written in C# that aims to highlight the attack surface of .NET and make the use of offensive...
PhoneSploit : Using Open ADB Ports We Can Exploit A Android Device

PhoneSploit : Using Open ADB Ports We Can Exploit A Android...

PhoneSploit is using open Adb ports we can exploit a Android Device. You can find open ports by clicking here.
Legion

Legion : An Open Source, Easy-To-Use, Super-extensible & Semi-Automated Network Penetration...

Legion, a fork of SECFORCE's Sparta, is an open source, easy-to-use, super-extensible and semi-automated network penetration testing framework that aids...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout