Pixload - Hiding Backdoor in image file xploitlab

Pixload – Tool For Creating/Injecting Payload Into Images

Hiding backdoor or payload in image is one of the best method to bypass some security. Pixload is set of tools for creating/injecting payload into images.

Read more »
DetExploit - Sofware That Detect Vulnerable Applications xploitlab

DetExploit – Tool That Detect Vulnerable Applications & Not-installed Important OS updates And Notify To User

DetExploit is software that detect vulnerable applications and not-installed important OS updates on the system, and notify them to user.

Read more »
Proxmark3 - Cloning Hotel Card, Credit Card, Subway Card xploitlab

Proxmark Kit – Hardware To Clonning And Emulating RFID Cards

The Proxmark is an RFID swiss-army tool, allowing for both high and low level interactions with the vast majority of RFID tags and systems world-wide.

Read more »
Lockdoor Framework 3 - Penetration Testing Framework with Cyber Security Resources

Lockdoor Framework – Penetration Testing Framework with Cyber Security Resources

LockDoor is a Framework aimed at helping penetration testers, bug hunters And cyber security. Containing the favorite and the most used tools by Pentesters.

Read more »
PostShell Post Exploitation Bind Backconnect Shell xploitlab

PostShell – Post Exploitation Bind/Backconnect Shell

PostShell is a post exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which allows for job control.

Read more »

Botb – Container Analysis, Exploitation And CICD Tool For Pentesters And Engineers

BOtB is the first tool aimed at hackers and developers to automate Container exploitation and which can be used to analyze and identify vulnerabilities.

Read more »
ShodanEye - Tool To Collects All Informations On internet xploitlab

ShodanEye – Tool To Collects All Informations About All Devices Directly Connected To The Internet Using The Specified Keywords

Shodan Eye is a tool to collects all information about all devices that are directly connected to the internet with the specified keywords that you enter.

Read more »