backdoorme Tools like metasploit are great for exploiting computers, but what happens after you’ve gained access to a computer? Backdoorme answers that question by unleashing…View More backdoorme: powerful auto-backdooring utility
Twitter account activity analysis tool – Simple Twitter Profile Analyzer. Note that your tweets (Tweet) may reveal some of your lifestyle and personal information! As…View More Twitter account activity analysis tool – Simple Twitter Profile Analyzer
Google Hacking the meaning of the original use of Google Google search engine to search for information technology and behavior, now refers to the use…View More Google Hacking for PenTester
Hunter is the easiest way to find email addresses from anywhere on the web, with just one click. # Features ✓ Get email addresses from…View More [Chrome extension] Hunter: find email addresses from anywhere on the web
1. What is Cross Site Scripting? Cross Site Scripting (Cross Site Scripting, XSS) is a Web application attack in the data output to the page…View More What is Cross-Site Scripting (XSS)?
Some usefull sqlmap command for testing SQL injection vulnerability. 1.Analyzing the current user is dba python sqlmap.py -u “url” –is-dba -v 1 2) — users:…View More Top 25 useful sqlmap commands
Undoubtedly one of the most famous and important in the world of Hacking and PenTest attacks are SQL injections , this is because the vast…View More SQL Injection Cheat Sheet
What is NoSQL? NoSQL often translated as Not only SQL, is a type of database that does not use the traditional SQL interface and…View More What is NoSQL injection?
A package of Pentest scripts I have made or commonly use Contents: Wordlists – Comprises of password lists, username lists and subdomains Web Service finder…View More pentestpackage: a package of Pentest scripts
Take a deep dive into hacking web sites and web applications using the latest techniques. In this course, we will teach you the top exploits…View More Exploiting Web-Based Applications