Quantcast
Channel: HACK4NET 🤖 Pentest Tools and News
Browsing all 541 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Mec - Mass Exploits Console

disclaimerplease use this tool only on authorized systems, im not responsible for any damage caused by users who ignore my warningi do not own the code of adapted exploits or toolsexploits are adapted...

View Article


Image may be NSFW.
Clik here to view.

Judy Android Malware Infects Over 36.5 Million Google Play Store Users

Security researchers have claimed to have discovered possibly the largest malware campaign on Google Play Store that has already infected around 36.5 million Android devices with malicious ad-click...

View Article


Image may be NSFW.
Clik here to view.

Linguistic Analysis Suggests WannaCry Hackers Could be From Southern China

It’s been almost four weeks since the outcry of WannaCry ransomware, but the hackers behind the self-spread ransomware threat have not been identified yet.However, two weeks ago researchers at Google,...

View Article

Image may be NSFW.
Clik here to view.

TheFatRat v1.9 - massive exploiting tool [Updated]

Thefatrat a massive exploiting tool revealedAn easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and...

View Article

Image may be NSFW.
Clik here to view.

WPSeku v0.2 - Wordpress Security Scanner

WPSeku is a black box WordPress vulnerability scanner that can be used to scan remote WordPress installations to find security issues.Screenshots Download and Usagegit clone...

View Article


Image may be NSFW.
Clik here to view.

InjectProc - Process Injection Techniques

Process injection is a very popular method to hide malicious behavior of code and are heavily used by malware authors.There are several techniques, which are commonly used: DLL injection, process...

View Article

Image may be NSFW.
Clik here to view.

Injecting Metasploit Payloads into Android Applications

The process of injecting Metasploit payloads into Android applications can be done both manually and automatically. This post will examine the automated process. However if in an engagement time is not...

View Article

Image may be NSFW.
Clik here to view.

Red on Red: The Attack Landscape of the Dark Web

We’ve frequently talked about how limited-access networks such as the Dark Web is home to various cybercriminal underground hotspots. Hosted and accessed via the Tor network, these sites house...

View Article


Image may be NSFW.
Clik here to view.

Wreckuests - yet another one hard-hitting tool to run DDoS atacks with...

What is this?Wreckuests is a script, which allows you to run DDoS attacks with HTTP-flood(GET/POST). It’s written in pure Python and uses proxy-servers as “bots”.⚠️ Warning: This script is published...

View Article


Image may be NSFW.
Clik here to view.

CSAPP - Buffer Overflow Attacks / Bufbomb Lab

This assignment will help you develop a detailed understanding of IA-32 calling conventions and stack organization. It involves applying a series of buffer overflow attacks on an executable file...

View Article

Image may be NSFW.
Clik here to view.

Explo - Human And Machine Readable Web Vulnerability Testing Format

explo is a simple tool to describe web security issues in a human and machine readable format. By defining a request/condition workflow, explo is able to exploit security issues without the need of...

View Article

Image may be NSFW.
Clik here to view.

MassBleed - SSL Vulnerability Scanner

USAGE:sh massbleed.sh [CIDR|IP] [single|port|subnet] [port] [proxy]ABOUT:This script has four main functions with the ability to proxy all connections:To mass scan any CIDR range for OpenSSL...

View Article

Image may be NSFW.
Clik here to view.

Cyphon - Incident Management and Response Platform

Collect, Filter, CreateCyphon ends the headaches that traditionally come with data management by streamlining all related processes through a single platform. Cyphon receives, processes, and triages...

View Article


Image may be NSFW.
Clik here to view.

Shogun - Shodan.io Command Line Interface

Shogun is a custom CLI for the Shodan.io search engine. The interface is designed to resemble a "shell" to the Shodan database. This way we can simply input commands to have the program perform various...

View Article

Image may be NSFW.
Clik here to view.

T2B - Cross-Platform Post Exploitation Toolkit

This project aims to administrate a network of compromised hosts, keeping your identity private (thanks to Tor) and your connections secure (thanks to TLS/SSL). For many times botnets get stuck because...

View Article


Image may be NSFW.
Clik here to view.

HowTo: Clear or Remove Last Login History in Linux

From the following article you will learn how to clear or remove the last login information on a Linux server from the command line.On the Linux systems there are three standard commands that show the...

View Article

Image may be NSFW.
Clik here to view.

Stinger-Tor Tor DoS tool

Stinger is a Python-2.7-coded Tor DoS tool with slow-GET and GET flood that can't be filtered by anti-DoS systems.Utilizes multi-threading with 256 threads default, and a thread capacity of 376. Waits...

View Article


Image may be NSFW.
Clik here to view.

Python Multithreaded Tor

Did you ever want to be at two different places at the same time?When I asked myself this question, I actually started developing this solution in my mind.While performing penetration tests there are...

View Article

Image may be NSFW.
Clik here to view.

BigBrainSecurity - a forensics scripts that will eventually turn into an IDS

BigBrainSecurity/cleanMFT.py filters master file tables and makes them more bearable to deal with. The primary use of the program is to import a text file made up of values separated by new lines that...

View Article

Image may be NSFW.
Clik here to view.

Belati - The Traditional Swiss Army Knife For OSINT

Belati is tool for Collecting Public Data & Public Document from Website and other service for OSINT purpose. This tools is inspired by Foca and Datasploit for OSINT What Belati can do?–...

View Article
Browsing all 541 articles
Browse latest View live