Wednesday, January 17, 2018

Hacking Tools

Home Hacking Tools
Anubis

Anubis – Subdomain Enumeration And Information Gathering Tool

Anubis Subdomain enumeration is one of the first steps in the information gathering phase and is required to get a full scope of the...
Password Cracking Tool

BitCracker -Windows Based BitLocker Password Cracking Tool

BitLocker is a full disk encryption feature included with Windows Vista and later. It is designed to protect data by providing encryption for entire...
XSS

An Automatic Tool to find the XSS Vulnerability- XSSSNIPER

XSS is a very commonly exploited vulnerability type which is very widely spread and easily detectable. What is (Cross Site Scripting)? An attacker can inject untrusted snippets of...

Blazy the modern login page bruteforcer with CSRF, Clickjacking Scanner and WAF Detector

Blazy the modern login page bruteforcer with CSRF, Clickjacking Scanner and WAF Detector. It produces accurate results. Features  Easy target selections Smart form and error...
Brute forcing

crowbar – OpenVPN/RDP/SSH/VNC Brute forcing Attack

Crowbar – Brute forcing tool What is Crowbar? Crowbar (formally known as Levye) is a brute forcing tool that can be used during penetration tests. It was...
WifiKill

WifiKill – Disabling WiFi for Other Android Users in the Network

Wifikill APK is fundamentally a wifi community controller app. It could disable the net connection of different gadgets linked to the equal wifi community. It...

How to Install Kali Linux On Your Android Without Rooting

Kali Linux is a Penetration Testing Distribution based on Debian. Developed by Offensive Security. It is the world’s most capable and famous security testing...

Most Valuable Free Hacking Books for Ethical Hackers

We have Prepared some of most Valuable Free Hacking Books for Hackers, Cyber security Professional, Security Researchers. All Books are Prepared as a PDF Format...
Tallow

Tallow the Transparent Tor firewall and Proxying solution for Windows

Tallow is a transparent Tor firewall and proxying solution for Windows. In a nutshell, when you run Tallow: All traffic from your PC is transparently...
Backdoor

Microsploit – Tool to Create Backdoor in Target Computer Using Kali Linux

Microsploit (Office Exploitation Tool) is a Simple tool fast and easily create backdoor office exploitation using module Metasploit packet. Like Microsoft Office in windows...

Recent Posts

Hide

How To Hide Photos/Folders Without Any Third Party Android Application

Hiding your personal picture files from your smartphone gallery is something critical. Frequently you end up installing a third party app to carry out...
block ads

How to block Annoying ads on your Android Phones

One of the longest running and still exceptionally viable techniques is to utilize an application whose sole reason for existing is to piece ads. Both...
Hide Photos

How to Hide your Private Photos From Android Gallery

Do you want to hide photos from Android gallery? yes, it is possible here is the cool trick. The Android operating system based on...
Whatsapp

How to Read a Deleted Whatsapp message that Sent to you...

Whatsapp recently enables the option to delete the sent messages in WhatsApp "Delete for Everyone" option which allows you to delete the message within...
email address

How to Reverse Lookup Email Address and Find Sender Location

Look nearer to discover companions old and new and in addition business contacts with these email address catalogs and individuals web indexes. The email doesn't...
skimmers

How Credit/Debit Card Skimmers Work ?

One of the more effective tools of 21st-century crooks is the skimmer. A credit/debit card skimmer is a malicious gadget hoodlums connect to an...
Keylogger

How to Create a Keylogger in Few Minutes Simply by using...

Keylogger also called keystroke logging, are software programs or hardware devices that record keys struck on the computer keyboard of an individual computer user or network...
Phone Hacked

How to find that Your Smartphone Has Been Hacked & How...

Smartphones are almost always connected to the internet, so it stands to reason that your phone hacked remotely. Hackers are always out there looking...
Access Without Keyboard

How To Access A Windows Desktop Without A Keyboard

Windows computers can suffer from issues with the keyboard not responding. Microsoft has included a way to access without a keyboard using only a mouse...
Mac OS

How To Speed Up A Slow Running Mac

Macintosh operating systems developed by Apple Inc  too can perform slow. Here we are providing you with the variety of tips that can help you identify...