Quantcast
Channel: HACK4NET 🤖 Pentest Tools and News
Browsing all 541 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Buffer Overflow Attack explanied

A buffer overflow occurs when a program or  process attempts to write more data to a fixed length block of memory, or buffer , than the buffer is allocated to hold. Since buffers are created to contain...

View Article


Image may be NSFW.
Clik here to view.

Mousejack Transmit - Wireless Mouse/Keyboard Attack With Replay/Transmit PoC

This is code extending the mousejack tools https://github.com/RFStorm/mousejack.Replay/transmit tools have been added to the original tools.POC packets based on a Logitech Wireless Combo MK220 which...

View Article


Image may be NSFW.
Clik here to view.

Anonymous: Wikileaks Reveals CIA Is Behind Russia 'Hacking' Election

View Article

Image may be NSFW.
Clik here to view.

Stitch - Python Remote Administration Tool (RAT)

This is a cross platform python framework which allows you to build custom payloads for Windows, Mac OSX and Linux as well. You are able to select whether the payload binds to a specific IP and port,...

View Article

Image may be NSFW.
Clik here to view.

EggShell - iOS/macOS Remote Administration Tool

EggShell is an iOS and macOS post exploitation surveillance pentest tool written in Python.This tool creates 1 line multi stage payloads that give you a command line session with extra functionality....

View Article


Image may be NSFW.
Clik here to view.

DLLInjector v0.2

This tool aims to implement various DLL injection techniques that work across multiple Windows versions. The user defines a DLL, a process ID, and technique and the tool attempts to inject the DLL into...

View Article

Image may be NSFW.
Clik here to view.

Mirai Botnet Source Code for Research

Linux Mirai Source Code for Research/IoT Development PurposesRequirementsgccgolangelectric-fencemysql-servermysql-clientWarningThe zip file for the is repo is being identified by some AV programs as...

View Article

Image may be NSFW.
Clik here to view.

Arachni - Web Application Security Scanner Framework

Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.It is smart, it trains itself...

View Article


Image may be NSFW.
Clik here to view.

PowerSploit - A PowerShell Post-Exploitation Framework

PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment. PowerSploit is comprised of the following modules and...

View Article


Image may be NSFW.
Clik here to view.

PowerShell Empire

Empire is a pure PowerShell post-exploitation agent built on cryptologically-secure communications and a flexible architecture. Empire implements the ability to run PowerShell agents without needing...

View Article

Image may be NSFW.
Clik here to view.

PowerShell Empire Web Interface

PowerShell Empire WebPowerShell Empire Web utilizes the Empire REST API Server. It is a web interface for using PowerShell Empire.Run Empire REST API ServerGet PowerShell Empire:...

View Article

Image may be NSFW.
Clik here to view.

HashView - Hashcat Web Inteface

Hashview is a tool for security professionals to help organize and automate the repetitious tasks related to password cracking. Hashview is a web application that manages hashcat (https://hashcat.net)...

View Article

Tcpreplay - Pcap editing and replaying utilities

Tcpreplay is a suite of free Open Source utilities for editing and replaying previously captured network traffic. Originally designed to replay malicious traffic patterns to Intrusion...

View Article


Image may be NSFW.
Clik here to view.

64BASE Boot2Root - HACKABLE VM GAME

Difficulty Rating[BEGINNER - INTERMEDIATE]Capture The FlagsThere are 6 flags to collect. Each in the format of flag1{ZXhhbXBsZSBmbGFnCg==}Beat the Empire and steal the plans for the Death Star before...

View Article

Image may be NSFW.
Clik here to view.

FAME - Automates Malware Evaluation

FAME is a recursive acronym meaning “FAME Automates Malware Evaluation”.It is meant to facilitate analysis of malicious files, leveraging as much knowledge as possible in order to speed up and automate...

View Article


Image may be NSFW.
Clik here to view.

JSShell - An interactive multi-user web JS shell

An interactive multi-user web based JS shell written in Python with Flask (for server side) and of course Javascript and HTML (client side). It was initially created to debug remote esoteric browsers...

View Article

Image may be NSFW.
Clik here to view.

Tweets metadata scraper & activity analyzer

The goal of this simple python script is to analyze a Twitter profile through its tweets by detecting:Average tweet activity, by hour and by day of the weekTimezone and language set for the Twitter...

View Article


Image may be NSFW.
Clik here to view.

Build Your Own PwnPhone

We’ll attempt to show you how to build your own Pwn Phone running the Kali operating system and our AOPP (Android Open Pwn Project) image.Let’s get cracking…Flashing the PhoneDownload the Recovery...

View Article

Image may be NSFW.
Clik here to view.

Turns Out Microsoft Has Already Patched Exploits Leaked By Shadow Brokers

The latest dump of hacking tools allegedly belonged to the NSA is believed to be the most damaging release by the Shadow Brokers till the date.But after analyzing the disclosed exploits, Microsoft...

View Article

Image may be NSFW.
Clik here to view.

Wall of Sheep - a password sniffing tool

The Wall of Sheep is dedicated to network security research and we make use of a powerful API provided by RethinkDB, Firebase to store and sync data in realtime.Without SSL/TLS, your password is just...

View Article
Browsing all 541 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>