Friday, August 23, 2019
Home Unicornscan – Network Scanning Tool to Find the Open Ports unicornscan1

unicornscan1

Must Need

RootOS

RootOS – macOS Root Helper

rootOS tries to use various CVEs to gain sudo or root access. All exploits have an end goal of adding ALL...
PwnAdventure3

PwnAdventure3 – Game Intentionally Vulnerable To Hacks

PwnAdventure3: Pwnie Island is a limited-release, first-person, true open-world MMORPG set on a beautiful island where anything could happen. That's because this game is...
Crackle

Crackle – Crack Bluetooth Smart Encryption

Crackle cracks BLE Encryption. It exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force...
Exploit

Exploit CVE-2017-6079 – Blind Command Injection In Edgewater Edgemarc Devices Exploit

This exploit was developed based on the technical description by depthsecurity https://depthsecurity.com/blog/cve-2017-6079-blind-command-injection-in-edgewater-edgemarc-devices The HTTP web-management application on Edgewater Networks Edgemarc appliances has a hidden page that...
Horn3t : Powerful Visual Subdomain Enumeration at the Click of a Mouse

Horn3t : Powerful Visual Subdomain Enumeration at the Click of a...

Horn3t is your number one tool for exploring subdomains visually. Tested on Windows 10 and Debian with Google Chrome/Chromium 73.
Pown Recon : A Powerful Target Reconnaissance Framework Powered By Graph Theory

Pown Recon : A Powerful Target Reconnaissance Framework Powered By Graph...

Pown Recon is a target reconnaissance framework powered by graph theory. The benefit of using graph theory instead of flat table...
BruteX

BruteX – Automatically Brute Force All Services Running On A Target

BruteX is a tool to automatically brute force all services running on a target. As you all know...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout