Android HID - Hacking Devices With Your Android, Use android as Rubber Ducky against targeted anther android device or PC

Android HID – Hacking Devices With Your Android

Overview Use Android as Rubber Ducky against targeted Android device or PC with HID attack. HID attack using Android Using Android as Rubber Ducky against Android or Windows. This is…

Read more »
RafelRat - Hack and Control Android Devices

RafelRat – Tool to Remote Android With WebPanel For Controlling Victims

Overview Rafel is Remote Access Tool (RAT) Used to Control Android Device Using WebPanel With More Advance Features written in Java. Main Features :  Admin Permission  Add App To White List  Looks Like Browser  Runs…

Read more »
Darkdump - dark web search engine and browser

Darkdump – Search The Deep Web Straight From Your Terminal

About Darkdump Darkdump is a simple script written in Python3.9 in which it allows users to enter a search term (query) in the command line and darkdump will pull all…

Read more »
Gitls - Enumerate git Repository URL From List of URL User Org xploitlab

Gitls – Enumerate git Repository URL From List of URL / User / Org

Overview This tool is available when the repository, such as github, is included in the bugbounty scope. Sometimes specified as an org name or user name rather than a specific…

Read more »
Sub404 - sublist3r and subfinder tool and checks for possibility of subdomain vulnerability takeover

Sub404 – A Tool To Check Subdomain Takeover Vulnerability

What is Sub 404 Sub 404 is a tool written in python which is used to check possibility of subdomain takeover vulnerabilty and it is fast as it is Asynchronous….

Read more »
Fake SMS - A simple command line tool using which you can skip phone number based SMS verification by using a temporary phone number that acts like a proxy - Create and Register Fake Phone Number

Fake-SMS – a Tool Which Can Skip Phone Number Based SMS Verification by Using a Temporary Phone Number

Fake-SMS A simple command line tool using which you can skip phone number based SMS verification by using a temporary phone number that acts like a proxy. Note-1: This is…

Read more »
BugBountyToolkit - All in One Bug Bounty Tools, scanning bugs tools

BugBountyToolkit – All in One Bug Bounty Tools

To find a bug on a system pentester have to scan all the possible method to found the vulnerability with a lot of tools. All system is basically have some…

Read more »