MouseJack Tool To Hijack Wireless Mouse And Keyboard With ReplyTransmit PoC xploitlab

MouseJack – A Tool To Hijack Wireless Mouse And Keyboard With Reply/Transmit PoC

MouseJack is tool that can hijack the wireless mouse or keyboard. Using vulnerabilities that affects the vast majority of wireless keyboard/mouse.

Read more »
Javascript Shell xploitlab

JSShell – Javascript Shell To Hijack Browser And Execute Command With Interactive Multi User Web

JSShell is a Shell Coded with javascript that can hijack browser and control it with javascript command, you can hijack by entering the JSShell server.

Read more »
Androwarn Tool To Analyze Malicious Android Application xploitlab

Androwarn – Tool To Analyze Malicious Android Application

Androwarn is a tool to analyze and warn the user about potential malicious bytecode by an android application that have been developed.

Read more »
Brutemap Tool For Automatic Web Application Brute Force Attack xploitlab

Brutemap – Tool For Automatic Web Application Brute Force Attack

Brutemap is an open source penetration testing tool that automates testing accounts to the site’s login page, based on Dictionary Attack.

Read more »
Tinfoleak ui Tool To Collect Detailed Information About Twitter Users Activities xploitlab

Tinfoleak – Tool To Collect Detailed Information About Twitter Users Activities

Tinfoleak is an open-source tool within the OSINT and Social Media Intelligence disciplines. Tool that can collect detailed data about twitter users.

Read more »
HT-WPS BREAKER Tool For Hacking Wifi Password From WPS xploitlab-1

HT-WPS BREAKER – Tool For Hacking Wifi Password From WPS

HT-WPS BREAKER is one of many wireless kungfu tool that can get the wireless password without Brute Forcing. This tool is extract the wps pin.

Read more »
The FatRat Introduction Tool For Generate Undetectable Backdoor (Windows, Mac & Android)

The FatRat – Tool For Generate Undetectable Backdoor (Windows, Mac & Android)

An Easy tool to Generate Backdoor for bypass AV. This tool compile malware with popular payload and then the compiled malware.

Read more »