Hacking cracking tools collection




















Secure browser help people to protect your privacy form third parties. This browser is tool…. Free website to Learn Hacking Programming languages need to be Hacking. Top 10 influence invention all time:. Top 10 influence invention all time: Published September 19, by Ayesha Shaikh. It can scan the entire Internet in under 6 minutes, transmitting 10 million packets per second, all from a single machine.

Massdns : MassDNS is a simple high-performance DNS stub resolver targeting those who seek to resolve a massive amount of domain names in the order of millions or even billions. Without special configuration, MassDNS is capable of resolving over , names per second using publicly available resolvers. Findomain : Findomain offers a dedicated monitoring service hosted in Amazon only the local version is free , that allows you to monitor your target domains and send alerts to Discord and Slack webhooks or Telegram chats when new subdomains are found.

Amass : The OWASP Amass Project performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques. Dnsgen : This tool generates a combination of domain names from the provided input.

Combinations are created based on wordlist. Custom words are extracted per execution. Dngrep : A utility for quickly searching presorted DNS names. Wfuzz : Wfuzz has been created to facilitate the task in web applications assessments and it is based on a simple concept: it replaces any reference to the FUZZ keyword by the value of a given payload.

Aquatone : Aquatone is a tool for visual inspection of websites across a large number of hosts, which provides a convenient overview of HTTP-based attack surface.

WhatWeb has over plugins, each to recognise something different. It launches a dictionary based attack against a web server and analyzes the response.

Dnscan : Dnscan is a python wordlist-based DNS subdomain scanner. The tool is supposed to be scheduled to run periodically at fixed times, dates, or intervals Ideally each day. New identified subdomains will be sent to Slack workspace with a notification push. Furthermore, the tool performs DNS resolution to determine working subdomains.

Recon-ng : Recon-ng is a full-featured reconnaissance framework designed with the goal of providing a powerful environment to conduct open source, web-based reconnaissance quickly and thoroughly. Jok3r : Jok3r is a framework that helps penetration testers with network infrastructure and web security assessments. DirBuster : This tool is a multi-threaded java application that is used to perform brute force over directories and file names on web and application servers.

DirBuster attempts to find hidden directories and pages within a web application, providing users with an additional attack vector.

Altdns : Altdns is a DNS recon tool that allows for the discovery of subdomains that conform to patterns. Altdns takes in words that could be present in subdomains under a domain such as test, dev, staging , as well as a list of known subdomains. BBHT : Bug Bounty Hunting Tools is a script to install the most popular tools used while looking for vulnerabilities for a bug bounty program.

Jadx : Jadx is a dex to Java decompiler. It is composed by a large number of libraries which are extended with plugins and programs that can be automated with almost any programming language.

Frida : Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers. The service works by hosting specialized XSS probes which, upon firing, scan the page and send information about the vulnerable page to the XSS Hunter service.

Ysoserial : A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.

Sqlmap : Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester, and a broad range of switches including database fingerprinting, over data fetching from the database, accessing the underlying file system, and executing commands on the operating system via out-of-band connections.

JS : Scanning website for vulnerable js libraries. It integrates with just about every data source available, and automates OSINT collection so that you can focus on data analysis. Create a new account. Ethical Hacking Collection AP. Topics for this course.

How to hack android phone. Easy automated tool for android hacking. High speed network authentication credentials cracking. Automated network services credentials cracking tool. Scan Website vulnerabilities upload shell and hack website. Slowloris attack on website. Session hijacking of website. Browser exploitation. Browser exploitation, Panick attack on browser. You are commenting using your Facebook account.

Beri tahu saya komentar baru melalui email. Beritahu saya pos-pos baru lewat surat elektronik. Beri peringkat:. Bagikan ini: Klik untuk membagikan di Facebook Membuka di jendela yang baru Klik untuk berbagi pada Twitter Membuka di jendela yang baru Klik untuk mencetak Membuka di jendela yang baru Klik untuk berbagi pada Pinterest Membuka di jendela yang baru Klik untuk berbagi pada Tumblr Membuka di jendela yang baru Klik untuk mengirim ini lewat surel kepada seorang teman Membuka di jendela yang baru Klik untuk berbagi pada Reddit Membuka di jendela yang baru Klik untuk berbagi di Linkedln Membuka di jendela yang baru.



0コメント

  • 1000 / 1000