Android HID - Hacking Devices With Your Android, Use android as Rubber Ducky against targeted anther android device or PC

Android HID – Hacking Devices With Your Android

Overview Use Android as Rubber Ducky against targeted Android device or PC with HID attack. HID attack using Android Using Android as Rubber Ducky against Android or Windows. This is…

Read more »
RafelRat - Hack and Control Android Devices

RafelRat – Tool to Remote Android With WebPanel For Controlling Victims

Overview Rafel is Remote Access Tool (RAT) Used to Control Android Device Using WebPanel With More Advance Features written in Java. Main Features :  Admin Permission  Add App To White List  Looks Like Browser  Runs…

Read more »
Sub404 - sublist3r and subfinder tool and checks for possibility of subdomain vulnerability takeover

Sub404 – A Tool To Check Subdomain Takeover Vulnerability

What is Sub 404 Sub 404 is a tool written in python which is used to check possibility of subdomain takeover vulnerabilty and it is fast as it is Asynchronous….

Read more »
BugBountyToolkit - All in One Bug Bounty Tools, scanning bugs tools

BugBountyToolkit – All in One Bug Bounty Tools

To find a bug on a system pentester have to scan all the possible method to found the vulnerability with a lot of tools. All system is basically have some…

Read more »
What is Botnet - How Botnet Work

BSF – Botnet Simulation Framework

Botnet is become dangerous threat on internet, if your computer infect by this kind of malicious sofware, then your computer become one of attacker bot that remotely can execute some…

Read more »
Tangalanga - The Zoom Conference Scanner Hacking Tool with TOR network

Tangalanga – The Zoom Conference Scanner Hacking Tool

Tangalanga is a Zoom Conference scanner. This scanner will check for a random meeting id and return information if available. You can try hack on Zoom.

Read more »
EvilPDF - Embedding Executable Files in PDF Documents to hack a computer

EvilPDF – Embedding Executable Files in PDF Documents

To hack a computer you need to perform social engineering to convince user to install our malware. If youre malware is just blank executable, then the user maybe suspicious and…

Read more »