linux

375 Pins
 3y
Collection by
wowned application is a proof of concept exploit for the authentication bypass methods in many World of Warcraft emulation authentication servers. Computer Forensics, Security Tools, Computer Security, Web Safety, Hobby Gifts, Proof Of Concept, Data Processing, Comedy Funny Videos
wowned – Authentication bypass for outdated WoW emulation authentication servers. – Security List Network™
wowned application is a proof of concept exploit for the authentication bypass methods in many World of Warcraft emulation authentication servers.
Protobuf-Inspector - Tool To Reverse-Engineer Protocol Buffers With Unknown Definition Computer Programming, Python Programming, Web Security, Hobbies For Men, Hobbies That Make Money, Computer Basics
Protobuf-Inspector - Tool To Reverse-Engineer Protocol Buffers With Unknown Definition
Protobuf-Inspector - Tool To Reverse-Engineer Protocol Buffers With Unknown Definition
Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security ☣ Computer Learning, Computer Coding, Computer Knowledge, Computer Internet, Computer Basic, Best Computer
PhpSploit - Stealth Post-Exploitation Framework
Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security ☣
Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security ☣ Best Hacking Tools, Learn Hacking, Hacking Books, Home Security Systems, Network Security
Breacher - Tool To Find Admin Login Pages And EAR Vulnerabilites
Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security ☣
Umbrella – A Phishing Dropper designed to Pentest. – Security List Network™ Hacking Lab, Disruptive Technology, Computer Hacker
Umbrella – A Phishing Dropper designed to Pentest. – Security List Network™
Umbrella – A Phishing Dropper designed to Pentest. – Security List Network™
penbox Osint Tools, Keyboard Hacks
PenBox v2 – A Penetration Testing Framework. – Security List Network™
penbox
Devploit v3.6 - Information Gathering Tool Hobbies For Adults, Hobbies For Couples, Computer Software, Computer Virus, Open Source Intelligence
Devploit v3.6 - Information Gathering Tool
Devploit v3.6 - Information Gathering Tool
Updates Gcat – A fully featured backdoor that uses Gmail as a C&C server. Changelog 09/12/2015: + Added some crazy 1337 ascii art. + Added an upload command. Computer Class, Computer Tips, Programming Languages, Kali Linux Tutorials
Updates Gcat – A fully featured backdoor that uses Gmail as a C&C server. – Security List Network™
Updates Gcat – A fully featured backdoor that uses Gmail as a C&C server. Changelog 09/12/2015: + Added some crazy 1337 ascii art. + Added an upload command.
Cr3dOv3r - Know The Dangers Of Credential Reuse Attacks
Cr3dOv3r - Know The Dangers Of Credential Reuse Attacks
colloteC
collote
Kwetza infects an existing Android application with either custom or default payload templates to avoid detection by antivirus. Kwetza allows you to infect Android applications using the target application’s default permissions or inject additional permissions to gain additional functionality. Android Security, Android Applications, Application Android, Antivirus, Detection, Linux, Python
kwetza – Python script to inject existing Android applications with a Meterpreter payload. – Security List Network™
Kwetza infects an existing Android application with either custom or default payload templates to avoid detection by antivirus. Kwetza allows you to infect Android applications using the target application’s default permissions or inject additional permissions to gain additional functionality.
+ droidstatx is a Python tool that generates an Xmind map with all the information gathered and any evidence of possible vulnerabilities identified via static analysis. + The map itself is an Android Application Pentesting Methodology component, which assists Pentesters to cover all important areas during an assessment. This was the main goal driving the tool development. + The tool also allows to add custom checks in a simple way, to confirm the existence of those patterns in the dalvik bytecod Mobile Security, Microsoft Courses, Ai Machine Learning, Custom Checks, Evidence
droidstatx – Android Applications Security Analyser, Xmind Generator. – Security List Network™
+ droidstatx is a Python tool that generates an Xmind map with all the information gathered and any evidence of possible vulnerabilities identified via static analysis. + The map itself is an Android Application Pentesting Methodology component, which assists Pentesters to cover all important areas during an assessment. This was the main goal driving the tool development. + The tool also allows to add custom checks in a simple way, to confirm the existence of those patterns in the dalvik bytecod
Smali Code Injector (SCI)is an Automate assembly code (smali) injection within Android applications.
Reverse engineering framework working at the assembly (SMALI) level. – Security List Network™
Smali Code Injector (SCI)is an Automate assembly code (smali) injection within Android applications.
Medusa v-2.2rc1 released : is a speedy, parallel, and modular, login brute-forcer. Tech Hacks, Data Structures, Tech Toys, Educational Apps, Science Art, Login
Medusa v-2.2rc1 released : is a speedy, parallel, and modular, login brute-forcer. – Security List Network™
Medusa v-2.2rc1 released : is a speedy, parallel, and modular, login brute-forcer.