Blog

Latest news around the world

10

Mar'20

Extended XSS Searcher and Finder - scans for different types of XSS on a list of URLs.

XSS Searcher is the extended version based on the initial idea already published as "xssfinder". This private version allows an …

Read More

09

Mar'20

HoneyBot - Capture, Upload And Analyze Network Traffic

HoneyBot is a set of scripts and libraries for capturing and analyzing packet captures with PacketTotal.com. Currently, this library provides …

Read More

09

Mar'20

Ghost Framework - uses an ADB to remotely access an Android device

Ghost Framework is an Android post-exploitation framework that uses an Android Debug Bridge to remotely access an Android device. Ghost …

Read More

06

Mar'20

Phonia - most advanced toolkits to scan phone numbers using only free resources

Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is …

Read More

06

Mar'20

Abaddon - makes red team operations faster, more repeatable and stealthier

Abaddon - Red team operations involve miscellaneous skills, the last several months and are politically sensitive; they require a lot …

Read More

05

Mar'20

PrivescCheck - Privilege Escalation Enumeration Script for Windows

PrivescCheck script aims to enumerate common Windows security misconfigurations which can be leveraged for privilege escalation and gather various information …

Read More

04

Mar'20

WiFi Passview - An open source batch script based WiFi Passview for Windows

WiFi Passview is an open-source batch script-based program that can recover your WiFi Password easily in seconds. This is for …

Read More

04

Mar'20

XCTR Hacking Tools - All in one for Information Gathering

📒 Read Me 📒 Initially, you need to create a project where you will save everything. All of the collected …

Read More

03

Mar'20

Gadgetinspector - A Byte Code Analyzer For Finding Deserialization Gadget Chains In Java Applications

This project inspects Java libraries and classpaths for gadget chains. Gadgets chains are used to construct exploits for deserialization vulnerabilities. …

Read More

03

Mar'20

The LAZY script will make your life easier, and of course faster

Lazy - This is a script for Kali Linux that automates many procedures about wifi penetration and hacking. I actually …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013