hack tools

  1. xanix

    Hacking Different methods for Database hacking

    Database Hacking Database contains mission critical data of the corporate firm, which makes it an obvious target by hackers. Password guessing – Once the hacker gains control of web server, he looks for the application configuration files which typically contain the database server name...
  2. Dorblue

    Tips Comprehensive Lists Of Checkers

    Hello guys, These are comprehensive list of IP, Browser and devices checkers Pixelscan Cover Your Tracks (top checker) AmIUnique (also top) Free IP Address Lookup & Proxy Detection Test | IP Address Details | Proxy IP Check (will check your IP quality) Downloads | AIDA64 (a program which...
  3. xanix

    Hacking How to use Sweeper to clean your Browser History

    As you can read, sweeper just clear your browsers like cookies, history, cache etc. 1. Installation Code: sudo apt install sweeper 2. Start Sweeper Code: sweeper / sudo sweeper 3. Overview If you opened sweeper successfully then you can see a tab of "Privacy Settings", here you can choose...
  4. Dorblue

    Hacking Hacking Apple | Icloud on iPhone & iPad

    The method is suitable for absolutely any iOS device (absolutely any version). What is the essence of the blocking bypass method? The method consists in spoofing the Apple iCloud DNS addresses. STEP 1 We choose absolutely any, there is no difference. STEP 2 If Wi-Fi is already connected...
  5. Otto

    Hacking 6 Methods of hacking two-factor authentication

    Two-factor authentication (2FA) has long been known for the security it can bring to organizations and their customers. The combination of what you know, what you have, and what you are is the heart and soul of 2FA and helps explain ITS relative reliability. Even so, attackers are known to have...
  6. al capone

    Hacking MorphVOX - a program for changing the sound of your voice when communicating

    In addition to simply changing the voice in IP telephony applications (Skype, AIM, Yahoo, MSN, GoogleTalk, TeamSpeak, etc.), this program can use audio effects that will add variety to Your background environment. For example, use the effect of a noisy shopping center or traffic jam - your...
  7. Otto

    Hacking 7 ways to wiretap your phone

    1. SORM - official wiretapping The most obvious way is official wiretapping by the state. In many parts of the world, telephone companies are required to provide access to wiretapping lines for the competent authorities. For example, in Russia, in practice, this is done technically through SORM...
  8. Jeremys

    Hacking Phpvuln - Audit Tool To Find Common Vulnerabilities In PHP Source Code

    Phpvuln - Audit Tool To Find Common Vulnerabilities In PHP Source Code phpvuln is an open source OWASP penetration testing tool written in Python 3, that can speed up the the process of finding common PHP vulnerabilities in PHP code, i.e. command injection, local/remote file inclusion and...
  9. xanix

    Hacking Web-Brutator - Modular Web Interfaces Bruteforcer

    Web Brutator Fast Modular Web Interfaces Bruteforcer ? Install python3 -m pip install -r requirements.txt ⏩ Usage $ python3 web-brutator.py -h __ __ . _______ __ __ / \ / \ __\_ | \______ \_______ __ / |___ / |...
  10. Otto

    Hacking WSuspicious - A Tool To Abuse Insecure WSUS Connections For Privilege Escalations

    WSuspicious Summary This is a proof of concept program to escalate privileges on a Windows host by abusing WSUS. Details in this blog post: WSUS Attacks Part 2: CVE-2020-1013 a Windows 10 Local Privilege Escalation 1-Day | GoSecure It was inspired from the WSuspect proxy project...
  11. xanix

    News Hackers break into corporate accounts in cloud services

    The US authorities reported hacking of cloud corporate accounts due to employees ' failure to comply with the requirements of cyber hygiene. The US Cybersecurity and Infrastructure Security Agency (CISA) has reported a series of successful cyber attacks on a number of cloud services. According...
  12. Gap

    Hacking ProtOSINT - A Python Script That Helps You Investigate Protonmail Accounts And ProtonVPN IP Addresses

    ProtOSINT is a Python script that helps you investigate ProtonMail accounts and ProtonVPN IP addresses. Description This tool can help you in your OSINT investigation on Proton service (for educational purposes only). ProtOSINT is separated in 3 sub-modules: [1] Test the validity of one...
  13. Serafim

    Hacking Sigurls - A Reconnaissance Tool, It Fetches URLs From AlienVault's OTX, Common Crawl, URLScan

    sigurls is a reconnaissance tool, it fetches URLs from AlienVault's OTX, Common Crawl, URLScan, Github and the Wayback Machine. Resources Usage Installation From Binary From source From github Post Installtion Contribution Usage To display help message for sigurls use the -h flag: $...
  14. xanix

    Hacking MaskPhish - Give A Mask To Phishing URL

    MaskPhish is a simple script to hide phishing URL under a normal looking URL(google.com or facebook.com). Legal Disclaimer: Usage of MaskPhish for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws...
  15. al capone

    Hacking Browser Blocker for Windows - Block Browsers from accessing the internet on Windows

    Browser Blocker for Windows blocks common browsers from accessing the internet on Windows. To block just run the batch as admin (Right click > Run as administrator) and select the browser. Download: Download Browser Blocker for Windows rar Download Browser Blocker for Windows rar
Top Bottom