ACE (Automated Corporate Enumerator) is a simple yet powerful VoIP corporate directory enumeration tool that mimics the behavior of an IP phone to download name and extension entries that …
Python based backdoor which uses Gmail to eject data through attachments. This RAT will help during the Red Team’s engagement to the rear of any Windows machines. It tracks …
Hack Instagram : Track unfollowers, Increase your followers, Download Stories, etc Features: Unfollow Tracker Increase Followers Download: Stories, Saved Content, Following/followers list, Profile Info Unfollow all your following Usage: …
If you are a good gamer and want to create your own gaming setup | gaming pc builder || pre built gaming pc , this list of the 20 …
A very fast network logon cracker with thc-hydra dictionary attack tool that supports many different services. You can use the thc-hydra tool to crack a password Many hackers love …
ReconCobra Reconcobra is Foot printing software for Ultimate Information Gathering Kali, Parrot OS, Black Arch, Termux, Android Led TV Interface Software have 82 Options with full automation with powerful information gathering …
FUD Android Payload And Listener Read the license before using any part from this code Malicious Android apk generator (Reverse Shell) Legal disclaimer: It is illegal to use GetDroid to attack targets without …
GDBFrontend is an easy, flexible and extensionable gui debugger. Installing Deb Package (Debian / Ubuntu / KDE Neon) You can install GDBFrontend via deb package for Debian-based distributions. You …
ANDRAX The first and unique Penetration Testing platform for Android smartphones. What is ANDRAX ANDRAX is a penetration testing platform developed specifically for Android smartphones, ANDRAX has the ability to run natively …
A man-in-the-middle phishing attack using the Android app to grab session cookies for any website, which in turn allows to bypass 2-factor authentication security. EvilApp brings as an example …
Exploit Pack is designed by an experienced team of software developers and exploits authors to automate processes so that penetration testers can focus on what is really important. to …
Recon-ng is a full-featured web reconnaissance framework written in Python. With independent modules, database interactions, built-in feature functions, interactive help, and command completion, Recon-ng provides a powerful environment in …
This is the successor of Evilginx 1, and it stays in-line with the MITM lineage. This tool is designed for a Phishing attack to capture login credentials and a …
Kali Linux Training Free Kali Linux is specifically tailored to the needs of penetration testing professionals. Kali Linux is a Debian-based Linux distribution aimed at advanced penetrations testing and …
It is the largest investment for minority stake by a technology company anywhere in the world and the largest FDI in technology sector in India. Mark Zuckerberg led Facebook …