Friday, 11 January 2019

Hash Generator & Cracker Online Offline

#Install Note Clone the repository: git clone https://github.com/0xR0/hediye.git #Then go inside: cd hediye/ #use examples: pyth... thumbnail 1 summary
  • #Install Note Clone the repository: git clone https://github.com/0xR0/hediye.git #Then go inside: cd hediye/ #use examples: pyth...

    Wednesday, 2 January 2019

    PHANTOM EVASION 2.0.1- An Antivirus Evasion Tool

    Phantom-Evasion is an interactive antivirus evasion tool written in python capable to generate (almost) FUD executable even with the most... thumbnail 1 summary
  • Phantom-Evasion is an interactive antivirus evasion tool written in python capable to generate (almost) FUD executable even with the most...

    Wednesday, 28 November 2018

    XSShell - A XSS Reverse Shell Framework

    XSShell is a cross-site-scripting reverse shell... Okay, well maybe it's not a true reverse shell, but it will allow you to interact in... thumbnail 1 summary
  • XSShell is a cross-site-scripting reverse shell... Okay, well maybe it's not a true reverse shell, but it will allow you to interact in...

    Monday, 26 November 2018

    Zstandard – Fast real-time compression algorithm

    Zstandard , or zstd as short version, is a fast lossless compression algorithm, targeting real-time compression scenarios at zlib-level a... thumbnail 1 summary
  • Zstandard , or zstd as short version, is a fast lossless compression algorithm, targeting real-time compression scenarios at zlib-level a...

    Saturday, 17 November 2018

    CloudBunny : Capture Real IP of Server behind WAF

    CloudBunny is a tool to capture the origin server that uses a WAF as a proxy or protection. This tool we used three search engines to s... thumbnail 1 summary
  • CloudBunny is a tool to capture the origin server that uses a WAF as a proxy or protection. This tool we used three search engines to s...

    Wednesday, 14 November 2018

    FakeImageExploiter - Use a Fake Image to Exploit Target

    This module takes one existing image.jpg and one payload.ps1 (input by user) and builds a new payload (agent.jpg.exe) that if executed it... thumbnail 1 summary
  • This module takes one existing image.jpg and one payload.ps1 (input by user) and builds a new payload (agent.jpg.exe) that if executed it...

    Tuesday, 13 November 2018

    DFIRTrack: (Digital Forensics and Incident Response Tracking application

    DFIRTrack (Digital Forensics and Incident Response Tracking application) is an open source web application mainly based on Django using a... thumbnail 1 summary
  • DFIRTrack (Digital Forensics and Incident Response Tracking application) is an open source web application mainly based on Django using a...