PhoneSploit

PhoneSploit – Using Open Adb Ports We Can Exploit A Device

When it comes to exploiting of Android device there are different ways of doing itSome people uses metasploit, some uses hardware tools and some uses other scriptsBut I tried the exploitation of android device...
geolocation seeker

Seeker – Find GeoLocation With High Accuracy

The Concept behind Seeker is really simple, we just host phishing pages to get credentials why not host a fake page that requests your loction like many popular location based websites.Seeker Hosts a fake...

Userrecon-Py – Find Usernames In Social Media Networks

Installation Guide Of Userrecon-Pysudo apt install python3 python3-pipInstall with pip3:sudo -H pip3 install git+https://github.com/decoxviii/userrecon-py.git userrecon-py --helpBuilding from Source Clone this repository, and:git clone https://github.com/decoxviii/userrecon-py.git ; cd userrecon-py sudo -H pip3 install -r requirements.txt...

Hacking Tools You Should Learn In 2019

Let’s start with a comparison between one thing and another, typically for the purpose of explanation or clarification.A bricklayer with many years of experience goes to a land to perform a job. He knows...
tidos-framework-reconnaissance-web-app

TiDoS Framework – Web Application Penetration Testing Toolkit For Reconnaissance

Web Application Penetration Testing consist of many stages, but the Footprinting/Reconnaissance stage is considered a process of getting deep information about a target.Here we have TIDOS Framework, a comprehensive web application audit tool, developed...

Recent Posts

Cyber Security Course

Trending