hacking tools

  1. Core

    Hacking Drow - Injects Code Into ELF Executables Post-Build

    Description TL;DR drow is a command-line utility that is used to inject code and hook the entrypoint of ELF executables (post-build). It takes unmodified ELF executables as input and exports a modified ELF contianing an embedded user-supplied payload that executes at runtime. Slightly more...
  2. xanix

    Hacking MaskPhish - Give A Mask To Phishing URL

    MaskPhish is a simple script to hide phishing URL under a normal looking URL(google.com or facebook.com). Legal Disclaimer: Usage of MaskPhish for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws...
  3. Serafim

    Tips CreditCard Checker From 1£ to 1.000.000£ without killing the Card

    There is Donation UK Site: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** You Can Check Gen CreditCard From 1£ To 1.000.000£ Good news: You Don't Need socks5 or proxys. carding method carding tools checking cc checking credit card...
  4. Serafim

    Hacking PatchChecker - Web-based Check For Windows Privesc Vulnerabilities

    Using PatchChecker to check vulnerabilities: To use the patchchecker, you can either go to the publicly hosted website here at patchchecker.com or you can git clone this repo, install the required libraries, makes sure patches.db is in the same directory as app.py and then start the application...
  5. Core

    Anonymity Protecting your computer from intrusion

    Greetings to all. In this article, I would like to tell you how to protect your computer from intrusion. To Close access to the startup folder. (Win + R and enter shell:startup) Close access to the registry. (Win + R and enter gpedit.msc > Administrative templates > Deny access to registry...
  6. al capone

    Hacking Browser Blocker for Windows - Block Browsers from accessing the internet on Windows

    Browser Blocker for Windows blocks common browsers from accessing the internet on Windows. To block just run the batch as admin (Right click > Run as administrator) and select the browser. Download: Download Browser Blocker for Windows rar Download Browser Blocker for Windows rar
  7. Serafim

    Hacking Zphisher - Automated Phishing Tool

    Zphisher is an upgraded form of Shellphish. The main source code is from Shellphish . But I have not fully copied it . I have upgraded it & cleared the Unnecessary Files . Zphisher has 37 Phishing Page Templates ; including Facebook , Twitter & Paypal . It also has 4 Port Forwarding Tools ...
  8. sanok

    Hacking Top 5 programs for hacking

    1: Aircrack-ng Download: Aircrack-ng - Downloads 2:EttercapDownload: Downloads « Ettercap 3: Wireshark Download: Wireshark · Download 4: John the ripper Download: John the Ripper password cracker 5: Sql map Download: sqlmap: automatic SQL injection and database takeover tool
  9. Lucky

    Anonymity 911Proxy | Install 911 VPN Setup Steps

    Today I will teach you 911Proxy basic setup guidelines for first-time users. Most of into carding line must have had experience with 911Proxy software. This VPN is not just like any other VPN that you will install at connect right away. There are series of steps you need to perform for the...
  10. Core

    Tips Metadata changes | method

    As you know, the photo contains not only the image, but also metadata. Metadata - information about the data itself. Any document (not only a photo) created with a mobile device or a computer has some hidden information underneath it. To read or delete metadata, I suggest you use mat Download...
  11. Jaysu

    Hacking DNSteal - DNS Exfiltration Tool For Stealthily Sending Files Over DNS Requests

    This is a fake DNS server that allows you to stealthily extract files from a victim machine through DNS requests. Below are a couple of different images showing examples of multiple file transfer and single verbose file transfer: Support for multiple files Gzip compression supported Now...
  12. Dep

    Hacking Hack WordPress Website with WPScan tool

    This tutorial in the category WordPress hacking will teach you how to scan WordPress websites for vulnerabilities, enumerate WordPress users accounts and brute force passwords. Enumerating WordPress hackers is the first step in a brute force attack in order to gain access to a WordPress account...
Top Bottom