Quantcast
Channel: HACK4NET 🤖 Pentest Tools and News
Browsing all 541 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

portSpider - A Lightning Fast Multithreaded Network Scanner Framework With...

A lightning fast multithreaded network scanner framework with modules.modules:http - Scan for open HTTP ports, and get the the titles.mysql - Scan for open MySQL servers, and try to log in with the...

View Article


Image may be NSFW.
Clik here to view.

BruteSploit - Bruteforce And Manipulation Wordlist

BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and can be used in CTF...

View Article


Image may be NSFW.
Clik here to view.

Tails 3.0 - The Amnesic Incognito Live System

New featuresNEW STARTUP AND SHUTDOWN EXPERIENCETails Greeter, the application to configure Tails at startup, has been completely redesigned for ease of use:All options are available from a single...

View Article

Image may be NSFW.
Clik here to view.

RED HAWK - All In One Tool

RED HAWK is An All In One Tool For Information Gathering, SQL Vulnerability Scannig and Crawling.Coded In PHPFeatures Of The Tool:Server detectionCloudflare detectorrobots scannerCMS...

View Article

Image may be NSFW.
Clik here to view.

Viper-shell : Testing exploitation and enumeration

Viper is designed in order to retrieve compromised files, processes, and services in case you have to reach out and grab information quickly. The viper can also be used for testing exploitation and...

View Article


Image may be NSFW.
Clik here to view.

LFISuite – Totally Automatic LFI Exploiter, ReverseShell and Scanner

Disclaimer: Author not responsible for any kind of illegal acts you cause. This is meant to be used for ethical purposes by penetration testers. If you plan to copy, redistribute please give credits to...

View Article

Image may be NSFW.
Clik here to view.

Europol arrest 6 over malware crypter and counter anti-virus platform

Authorities have conducted a large-scale operation against cyber criminals in several European countries. As a result, 6 people have been arrested while 36 have been questioned after Europol, Germany’s...

View Article

Image may be NSFW.
Clik here to view.

Meet Sophia, the Humanoid Robot

Hanson Robotics showed off its life-like robot Sophia today in Hong Kong as it answered questions, cracked jokes, and proved that it no longer wishes to see the destruction of all humankind.In March at...

View Article


Image may be NSFW.
Clik here to view.

Cherry Blossom: #WikiLeaks’ Latest Dump Exposes #CIA Wireless Hacking Tools

The whistleblowing site WikiLeaks is back with yet another Vault 7 series related document. This one is called “Cherry Blossom” program which gives a glance at the wireless hacking capabilities of The...

View Article


Image may be NSFW.
Clik here to view.

Pentestly Framework: When Pentesting Meets Python and Powershell

Python appears to be an ever growing trend in the security community. Being able to connect Python tools together has proven beneficial for us. Powershell has also seen increasingly more use due to its...

View Article

Image may be NSFW.
Clik here to view.

SigPloit - Telecom Signaling Exploitation Framework

SiGploit a signaling security testing framework dedicated to Telecom Security professionals and reasearchers to pentest and exploit vulnerabilites in the signaling protocols used in mobile operators...

View Article

Image may be NSFW.
Clik here to view.

AVET - AntiVirus Evasion Tool

AVET is an AntiVirus Evasion Tool, which was developed for making life easier for pentesters and for experimenting with antivirus evasion techniques. In version 1.1 lot of stuff was introduced, for a...

View Article

Image may be NSFW.
Clik here to view.

Droid Hunter - Android application vulnerability analysis and Android pentest...

SupportApp info checkBaksmaling android appDecompile android appExtract class fileExtract java codePattern base Information LeakageHow to Install?A. Download(clone) & Unpack DROID-HUNTERgit clone...

View Article


Image may be NSFW.
Clik here to view.

The First In-Screen Fingerprint Reader is Coming, But Not from Apple or Samsung

For months, consumers have been itching to know whether it will be Samsung or Apple that has the first in-screen fingerprint scanner in their next smartphone. Now, reputable researcher Jiutang Pan has...

View Article

Image may be NSFW.
Clik here to view.

FiercePhish - full-fledged phishing framework

FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more. The features will...

View Article


Image may be NSFW.
Clik here to view.

Web Hosting Company Pays $1 Million to Ransomware Hackers to Get Files Back

South Korean web hosting provider has agreed to pay $1 million in bitcoins to hackers after a Linux ransomware infected its 153 servers, encrypting 3,400 business websites and their data, hosted on...

View Article

Image may be NSFW.
Clik here to view.

CATPHISH - For Phishing And Corporate Espionage

Project for phishing and corporate espionage.Current AlgorithmsSingularOrPluraliseprependOrAppenddoubleExtensionsmirrorizationhomoglyphsdashOmissionPunycodeCATPHISH v.0.0.5Added more languages....

View Article


Image may be NSFW.
Clik here to view.

ProtonMail provider launches ProtonVPN

You can now directly get ProtonVPN by visiting https://protonvpn.com“In the past year, we have seen more and more challenges against Internet freedom,” says ProtonMail Co-Founder Dr. Andy Yen, “now...

View Article

Image may be NSFW.
Clik here to view.

RedhawkSDR - a software-defined radio (SDR) framework #NSA

REDHAWK is a software-defined radio (SDR) framework designed to support the development, deployment, and management of real-time software radio applications. To support the design and development of...

View Article

Image may be NSFW.
Clik here to view.

ICS SCADA NSA Situational Awareness: Grassmarlin #NSA

Provide IP network situational awareness of industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks to support network security. Passively map, and visually...

View Article
Browsing all 541 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>