Idisagree Tool To Control Remote Computers Using Discord BOT

Idisagree – Tool To Control Remote Computers Using Discord BOT

In hacker hand discord can do something to remote your computer. Idisagree is a tool that can remote computer using discord bot and python 3.

Read more »
Metadata Attacker Tool To Generate Media Files With Malicious Metadata

Metadata Attacker – Tool To Generate Media Files With Malicious Metadata

Metadata Attacker is Exploitation Tool that can create an image (.jpg), audio (.mp3) or video (.mp4) file containing your custom malicious metadata.

Read more »
Javascript Shell xploitlab

JSShell – Javascript Shell To Hijack Browser And Execute Command With Interactive Multi User Web

JSShell is a Shell Coded with javascript that can hijack browser and control it with javascript command, you can hijack by entering the JSShell server.

Read more »
The FatRat Introduction Tool For Generate Undetectable Backdoor (Windows, Mac & Android)

The FatRat – Tool For Generate Undetectable Backdoor (Windows, Mac & Android)

An Easy tool to Generate Backdoor for bypass AV. This tool compile malware with popular payload and then the compiled malware.

Read more »
kage control panel graphical user interface for metasploit framework xploitlab

KAGE – Graphical User Interface For Metasploit Framework

If you are similar with Metasploit framework that run in CLI mode, I will introduce you Graphical Interface Tool For Metasploit Framework.

Read more »
UberDucky (Wireless USB Rubber Ducky) Tool For Injecting Keystoke Into Computer Via Wireless xploitlab

UberDucky – (Wireless USB Rubber Ducky) Tool For Injecting Keystoke Into Computer Via Wireless

Uberducky is a tool for injecting keystrokes into a target computer that can be triggered wirelessly via BLE. This tool is impersonates a USB keyboard.

Read more »
Andrax Hacking With Android Phone

ANDRAX – Penetration Platfrom For Android

ANDRAX is a penetration testing platform for Android smartphones. You can perform hacking from your android phone with all Features and Hacking tools.

Read more »