Posts Grid

GonnaCry – Linux Ransomware That Encrypts All User Files

Read our disclaimer before you continue. This tool is only provided as a convince any actions and or activities related to the material contained within...

Windows crypto-ransomware POC

Windows crypto-ransomware POC Credits: mauri870 Note: This project is purely academic, use at your own risk. I do not encourage in any way the use...

WhatsPwn 2.0 – Extract sensitive data and inject payloads into any Android devices

WhatsPwn 2.0 - Linux Tool to extract sensitive data and inject payloads into any Android devices. Credits: José Luis Rodríguez Fragoso (jlrodriguezf) here is a...

Simple Keylogger – A simple keylogger for Windows, Linux and Mac

Simple Keylogger - A simple keylogger for Windows, Linux and Mac Credits: GiacomoLaw Welcome to the simple keylogger repo! A keylogger is a program that...

CloudFail – Utilize misconfigured DNS Find hidden IP’s behind the CloudFlare network

CloudFail Credits: m0rtem CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of...

Hacking Android Smart Phone Using AhMyth Android RAT

Welcome back, Today I will show you how to hack an Android smart phone to gain remote access. In this tutorial we will be working...

Posts Slider

mitmAP – python program to create a fake AP and sniff data

mitmAP - A python program to create a fake AP and sniff data. _ _ ___ ______ (_) | / _ \ | ___ \...

plc – ns-3 module for simulations of power line communication networks

An ns-3 module for simulations of power line communication networks plc An ns-3 module for simulations of power line communication networks This software is freely...

Maybe – See what a program does before deciding whether you really want it to happen

See what a program does before deciding whether you really want it to happen. rm -rf pic* Are you sure? Are you one hundred percent...

WiFi Hacker – Script For Attacking Wireless Connections Using Kali Tools

WiFi Hacker - Script For Attacking Wireless Connections Using Kali Tools Shell Script For Attacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP,...

SeeCLRly – Fileless SQL Server CLR-based Custom Command Execution

Fileless SQL Server CLR-based Custom Stored Procedure Command Execution For more info about the techinque, please visit sekirkity.com This techinque will allow for the execution...

yoast seo premium free

Spelling error report

The following text will be sent to our editors: