Top 20 Most Popular Hacking Tools in 2018
Reviewed by Anonymous
on
4:20 AM
Rating:
Smap - Shellcode Mapper
Reviewed by Anonymous
on
12:18 PM
Rating: 5
ThunderDNS - Tool To Forward TCP Traffic Over DNS Protocol
Reviewed by Anonymous
on
12:41 PM
Rating: 5
Keyfinder - A Tool For Finding And Analyzing Private (And Public) Key Files, Including Support For Android APK Files
Reviewed by Anonymous
on
4:27 AM
Rating: 5
stoQ - An Open Source Framework For Enterprise Level Automated Analysis
Reviewed by Anonymous
on
12:24 PM
Rating: 5
Pocsuite v2.0.8 - Remote Vulnerability Testing Framework Developed By The Knownsec Security Team
Reviewed by Anonymous
on
4:40 AM
Rating: 5
PA Toolkit - A Collection Of Traffic Analysis Plugins Focused On Security
Reviewed by Anonymous
on
12:35 PM
Rating: 5
SQLiScanner - Automatic SQL Injection With Charles And Sqlmap API
Reviewed by Anonymous
on
4:54 AM
Rating: 5
Hatch - Tool To Brute Force Most Websites
Reviewed by Anonymous
on
12:54 PM
Rating: 5
Serial Swatter and Stalker Mir Islam Arrested for Allegedly Dumping Body in River
Reviewed by Anonymous
on
12:39 PM
Rating: 5
BruteX v1.9 - Automatically Brute Force All Services Running On A Target
Reviewed by Anonymous
on
4:48 AM
Rating: 5
nodeCrypto - Ransomware Written In NodeJs
Reviewed by Anonymous
on
12:52 PM
Rating: 5
SharpWeb - .NET 2.0 CLR Project To Retrieve Saved Browser Credentials From Google Chrome, Mozilla Firefox And Microsoft Internet Explorer/Edge
Reviewed by Anonymous
on
5:18 AM
Rating: 5
Ustealer - Ubuntu Stealer, Steal Ubuntu Information In Local PC
Reviewed by Anonymous
on
1:04 PM
Rating: 5
W3Brute - Automatic Web Application Brute Force Attack Tool
Reviewed by Anonymous
on
4:34 AM
Rating: 5
FBI Seizes 15 DDoS-For-Hire Websites, 3 Operators Charged
Reviewed by Anonymous
on
12:53 AM
Rating: 5
US Indicts Two Chinese Government Hackers Over Global Hacking Campaign
Reviewed by Anonymous
on
11:48 PM
Rating: 5
Doppelganger - Python Script To Scan Duplicate Copies In A Given Directory
Reviewed by Anonymous
on
12:31 PM
Rating: 5
Feds Charge Three in Mass Seizure of Attack-for-hire Services
Reviewed by Anonymous
on
11:26 AM
Rating: 5
Hacker Discloses New Unpatched Windows Zero-Day Exploit On Twitter
Reviewed by Anonymous
on
7:54 AM
Rating: 5
IP Obfuscator - Simple Tool To Convert An IP Into Integer, Hexadecimal Or Octal Form
Reviewed by Anonymous
on
4:14 AM
Rating: 5
Microsoft Issues Emergency Patch For Under-Attack IE Zero Day
Reviewed by Anonymous
on
11:52 PM
Rating: 5
Wordlistctl - Fetch, Install And Search Wordlist Archives From Websites And Torrent Peers
Reviewed by Anonymous
on
1:27 PM
Rating: 5
Microsoft Issues Emergency Fix for IE Zero Day
Reviewed by Anonymous
on
1:12 PM
Rating: 5
Scavenger - Is A Multi-Threaded Post-Exploitation Scanning Tool For Scavenging Systems, Finding Most Frequently Used Files And Folders As Well As "Interesting" Files Containing Sensitive Information
Reviewed by Anonymous
on
4:39 AM
Rating: 5
Mayday! NASA Warns Employees of Personal Information Breach
Reviewed by Anonymous
on
12:52 AM
Rating: 5
A Chief Security Concern for Executive Teams
Reviewed by Anonymous
on
1:50 PM
Rating: 5
pyHAWK - Searches The Directory Of Choice For Interesting Files. Such As Database Files And Files With Passwords Stored On Them
Reviewed by Anonymous
on
1:15 PM
Rating: 5
Hashie - Crack Hashes In A Blink Of An Eye
Reviewed by Anonymous
on
6:33 AM
Rating: 5
New Malware Takes Commands From Memes Posted On Twitter
Reviewed by Anonymous
on
1:59 AM
Rating: 5
Deep Explorer - Tool Which Purpose Is The Search Of Hidden Services In Tor Network, Using Ahmia Browser And Crawling The Links Obtained
Reviewed by Anonymous
on
12:54 PM
Rating: 5
R3Con1Z3R - A Lightweight Web Information Gathering Tool With An Intuitive Features (OSINT)
Reviewed by Anonymous
on
4:16 AM
Rating: 5
Punk.Py - Unix SSH Post-Exploitation Tool
Reviewed by Anonymous
on
1:29 PM
Rating: 5
LDAP_Search - Tool To Perform LDAP Queries And Enumerate Users, Groups, And Computers From Windows Domains
Reviewed by Anonymous
on
4:35 AM
Rating: 5
ZIP Shotgun - Utility Script To Test Zip File Upload Functionality (And Possible Extraction Of Zip Files) For Vulnerabilities
Reviewed by Anonymous
on
1:56 PM
Rating: 5
imaginaryC2 - Tool Which Aims To Help In The Behavioral (Network) Analysis Of Malware
Reviewed by Anonymous
on
4:14 AM
Rating: 5
Critical SQLite Flaw Leaves Millions of Apps Vulnerable to Hackers
Reviewed by Anonymous
on
10:10 PM
Rating: 5
Aircrack-ng 1.5 - Complete Suite Of Tools To Assess WiFi Network Security
Reviewed by Anonymous
on
1:10 PM
Rating: 5
New Facebook Bug Exposed 6.8 Million Users Photos to Third-Party Apps
Reviewed by Anonymous
on
9:58 AM
Rating: 5
New Shamoon Malware Variant Targets Italian Oil and Gas Company
Reviewed by Anonymous
on
8:14 AM
Rating: 5
Fake Bomb Threat Emails Demanding Bitcoins Sparked Chaos Across US, Canada
Reviewed by Anonymous
on
4:59 AM
Rating: 5
NETworkManager - A Powerful Tool For Managing Networks And Troubleshoot Network Problems!
Reviewed by Anonymous
on
4:15 AM
Rating: 5
Faraday v3.4 - Collaborative Penetration Test and Vulnerability Management Platform
Reviewed by Anonymous
on
1:10 PM
Rating: 5
Spammed Bomb Threat Hoax Demands Bitcoin
Reviewed by Anonymous
on
12:55 PM
Rating: 5
Celerystalk - An Asynchronous Enumeration and Vulnerability Scanner
Reviewed by Anonymous
on
3:39 AM
Rating: 5
Jackhammer - One Security Vulnerability Assessment/Management Tool To Solve All The Security Team Problems
Reviewed by Anonymous
on
1:57 PM
Rating: 5
Scanning for Flaws, Scoring for Security
Reviewed by Anonymous
on
1:51 PM
Rating: 5
SpiderFoot - The Most Complete OSINT Collection And Reconnaissance Tool
Reviewed by Anonymous
on
3:46 AM
Rating: 5
Adobe's Year-End Update Patches 87 Flaws in Acrobat Software
Reviewed by Anonymous
on
2:42 AM
Rating: 5
Microsoft Issues Patch for Windows Zero-Day Flaw Under Active Attack
Reviewed by Anonymous
on
12:54 AM
Rating: 5
Subscribe to:
Posts (Atom)