ace voip | Penetration Testing Tools

ACE (Automated Corporate Enumerator) is a simple yet powerful VoIP corporate directory enumeration tool that mimics the behavior of an IP phone to download name and extension entries that can display a given phone on its screen interface. In the Read more…

Amap ( Application Mapping Tool Scanning )

Amap ( Application Mapping ) is designed to correlate applications that reside on a host to a specific port or port. Amap connects it to the port (s) and sends packets that will automatically respond in response. These packets typically Read more…

How to Crack Online Passwords with THC Hydra

How to Crack Online Password with Tamper Data & THC Hydra

A very fast network logon cracker with thc-hydra dictionary attack tool that supports many different services. You can use the thc-hydra tool to crack a password Many hackers love this tool due to its GUI and Cmdline interface. If you Read more…

Inshackle – Hack Instagram : Track Unfollowers, Increase Your Followers, Download Stories, Etc

hack instagram

Hack Instagram : Track unfollowers, Increase your followers, Download Stories, etc Features: Unfollow Tracker Increase Followers Download: Stories, Saved Content, Following/followers list, Profile Info Unfollow all your following Usage: git clone https://github.com/thelinuxchoice/inshackle cd inshackle bash inshackle.sh Author: github.com/thelinuxchoice/inshackle Download Inshackle Readmore

Powershell-RAT – Python Based Backdoor That Uses Gmail To Exfiltrate Data Through Attachment

rat

Python based backdoor which uses Gmail to eject data through attachments. This RAT will help during the Red Team’s engagement to the rear of any Windows machines. It tracks user activity using screen capture and sends it to an attacker Read more…

WH-Cyberspace WH – RAT Android+Windows

WH-Cyberspace

It is illegal to use the WH-cyberspace hacking tool to attack targets without prior mutual consent. It is the ultimate responsibility of the user to comply with all applicable local, state and federal laws. The developers assume no liability and Read more…

MD5 Algorithm C++

Hello, now I will talk about parsing and implementing md5 hash algorithm in C. The algorithm itself was first widely used to verify the integrity of information and to store passwords until it was recognized as unsafe. You can read Read more…