DDOS Website

DDOS a Website Anonymously by Using Kali Linux Tools

DDOS tools are capable of putting heavy loads on HTTP servers and bring them to their knees by exhausting its resources. What is DDOS attack? A...
Automated Telegram Based SQLi Vulnerability Scanner

Powerful and Fully Automated Telegram Based SQLi Vulnerability Scanner – Katyusha Scanner

New powerful Fully Automated SQli Vulnerability scanner which inherits the functionality of Telegram messenger and Arachni Scanner introduced by Russian member in dark web...
Linux Exploit Suggester -simple script to keep track of vulnerabilities

Linux Exploit Suggester – A Kali Linux Tool to Find the Linux OS...

According to Kali Tool list, Linux Exploit Suggester provide just a simple script to keep track of vulnerabilities and suggest possible exploits to gain...

RouterSploit – Exploitation Framework for Embedded devices

The RouterSploit Framework is an open-source exploitation framework devoted to embedded devices. It includes various modules that aid penetration testing operations:
Commix – Automated All-in-One OS Command Injection and Exploitation Tool

Commix – Automated All-in-One OS Command Injection and Exploitation Tool

Commix (short for and njection eploiter) has a simple environment and it can be used, from web developers, penetration testers or even security researchers...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security