hack tools 2021

  1. Lucky

    Tips What is phishing fraud and 10 tips to avoid it

    Cyber criminals use different methods of attacks to get your personal data, and phishing fraud is one of them. Phishing scams are usually fraudulent email messages that come from legitimate businesses (for example, your university, your Internet service provider, your bank, or your online...
  2. Soldier

    Hacking Satellite - Easy-To-Use Payload Hosting

    Satellite - Easy-To-Use Payload Hosting Satellite is an web payload hosting service which filters requests to ensure the correct target is getting a payload. This can also be a useful service for hosting files that should be only accessed in very specific circumstances. Quickstart Guide...
  3. Dorblue

    Hacking Postshell - Post Exploitation Bind - Backconnect Shell

    PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which allows for job control. The stub size is around 14kb and can be compiled on any Unix like system. Why not use a traditional Backconnect/Bind Shell? PostShell...
  4. xanix

    Hacking WPCracker - WordPress User Enumeration And Login Brute Force Tool

    WPCracker WordPress user enumeration and login Brute Force tool for Windows and Linux With the Brute Force tool, you can control how aggressive an attack you want to perform, and this affects the attack time required. The tool makes it possible to adjust the number of threads as well as how...
  5. Lucky

    Hacking MobileHackersWeapons - Mobile Hacker's Weapons / A Collection Of Cool Tools Used By Mobile Hackers

    Weapons OS Type Name Description All Analysis RMS-Runtime-Mobile-Security Runtime Mobile Security (RMS) - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime All Analysis scrounger Mobile application testing toolkit All Proxy BurpSuite The...
  6. al capone

    Hacking UhOh365 - A Script That Can See If An Email Address Is Valid In Office365

    UhOh365 A script that can see if an email address is valid in Office365. This does not perform any login attempts, is unthrottled, and is incredibly useful for social engineering assessments to find which emails exist and which don't. Microsoft does not consider "email enumeration" a...
  7. xanix

    Hacking MaskPhish - Give A Mask To Phishing URL

    MaskPhish is a simple script to hide phishing URL under a normal looking URL(google.com or facebook.com). Legal Disclaimer: Usage of MaskPhish for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws...
Top Bottom