• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

attack

  1. itsMe

    Bruter19 - Advanced Brute Force Attack Tool

    Bruter19     Advanced Brute Force Attack Tool.     This tool has been developed for "ethical hacking course" students don't use it for illegal purposes. ADDED FEATURES IN V2.0     The Tool Supports Turkish Language Now     The Tool Is Able To Generate Personalized Wordlist Now     The Tool Is...
  2. dEEpEst

    WhatsApp SS7 Attack

    Hidden content Video shows a way of obtaining WhatsApp data by attacking a part of the backbone of telecoms networks known as SS7. Hack shown off here by Positive Technologies and full story on how to protect yourself from SS7 attacks here (this video is not a tutorial on how to hack others...
  3. itsMe

    wifipumpkin3 v1.0.7 - Powerful framework for rogue access point attack

    Wifipumpkin3 wifipumpkin3 is a powerful framework for rogue access point attack, written in Python, that allows and offers to security researchers, red teamers, and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack. Main Features     Rogue access point attack...
  4. itsMe

    Skeleton v1.7 - Social Engineering tool attack switcher

        Skeleton is a Social Engineering tool attack switcher     Type: Phishing Tool     Websites languages: English, French     Attack Switcher for phishing: Facebook, Linkedin, Twitter, Pinterest, Google, Instagram, Microsoft, Netflix, Paypal, Wordpress, Amazon, Ebay, CyberghostVPN, NordVPN...
  5. itsMe

    EvilApp - Phishing Attack Using An Android App

    EvilApp - Phishing Attack Using An Android App To Grab Session Cookies For Any Website (ByPass 2FA) Man-in-the-middle phishing attack using an Android app to grab session cookies for any website, which in turn allows to bypass 2-factor authentication protection. EvilApp brings as an example the...
  6. itsMe

    Self-XSS - Self-XSS Attack

    Self-XSS - Self-XSS Attack Using Bit.Ly To Grab Cookies Tricking Users Into Running Malicious Code How it works? Self-XSS is a social engineering attack used to gain control of victims' web accounts by tricking users into copying and pasting malicious content into their browsers. Since Web...
  7. itsMe

    BluForce-FB v2.0 - Brute Force Attack

    Brute Force Attack on Facebook Accounts Note: EMAIL = ID = PHONE Hidden content
  8. itsMe

    Paradoxia - Advanced Attack Toolkit

    Paradoxia Console Features     Multithreaded, You can get multiple sessions.     Configuration file BOT information database.     Root Shell.     Easy to use.     Interact with online BOTs in a session.     Kill a BOT.     Blacklist BOT IP Adresses from connecting.     Scan Connected IP...
  9. dEEpEst

    Host Header Attack Vulnerability Demonstration | POC | Penetration Testing 

     Host Header Attack Vulnerability Demonstration | POC | Penetration Testing  Video Tutorial  Hidden content
  10. dEEpEst

    U.S Launched Cyber Attack on Iranian Military Computers After U.S Military Drone Shot Down by Iran

    U.S Launched Cyber Attack on Iranian Military Computers After U.S Military Drone Shot Down by Iran ◾️United States Military launched a cyber attack on the Iranian Military computers that used to control the Iran missiles after the $240 million Worth U.S drone shootdown by Iran. ◾️The attack...
  11. dEEpEst

    w3af  Web Application Attack and Audit Framework

    w3af is a Web Application Attack and Audit Framework. The project’s goal is to create a framework to help you secure your web applications by finding and exploiting all web application vulnerabilities. Video: Hidden content Download: Hidden content
  12. 0x1

    SKA - Simple Karma Attack

    SKA - Simple Karma Attack SKA allows you to implement a very simple and fast karma attack. You can sniff probe requests to choice the fake AP name or, if you want, you could insert manually the name of AP (evil twin attack). When target has connected to your WLAN you could active the HTTP...
  13. dEEpEst

    Exploring the Attack Surface of Blockchain: A Systematic Overview

    Hidden content
  14. dEEpEst

    ACsploit ( Attack DDoS with an PDF)

    ACsploit: a tool for generating worst-case inputs for algorithms ACsploit is an interactive command-line utility to generate worst-case inputs to commonly used algorithms. These worst-case inputs are designed to result in the target program utilizing a large amount of resources (e.g. time or...
  15. dEEpEst

    What is Dos attack? - How does a DoS attack work?

    Hidden content
  16. dEEpEst

    Evil Twin Attack Methodology

    Hidden content
  17. itsMe

    Seth - Perform A MitM Attack And Extract Clear Text Credentials From RDP Connections

    Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to extract clear text credentials. It was developed to raise awareness and educate about the importance of properly configured RDP connections in the context of pentests...
  18. F B I

    The Shadow Attack Framework

    Hidden content
  19. itsMe

    Bully: WPS Brute Force Attack

    Introduction Bully is a new implementation of the WPS (Wifi Protected Setup) brute force attack. It’s almost identical as other already existing WPS brute force attack tools, but Bully represents an improved version of Reaver and includes a few advantages. You can take a look at Brute Force...
  20. dEEpEst

    Ethical Hacking - SQL Injection Attack

    SQL Injection (SQLi) refers to an injection attack wherein an attacker  can execute malicious SQL statements (also commonly referred to as a  malicious payload) that control a web application’s database server . The impact SQL injection can have on a business is far reaching. A  successful...
Back
Top