Hackers Choice
Home
Recent Posts
HowTo
Videos
Freeware
Our Apps
About Us
Contact Us
Legal Information
Privacy Policy
Terms of Service
Home
HowTo
Videos
Freeware
Home
Tags
Tag : exploit
DeimosC2 : A Golang Command & Control Framework For Post-Exploitation
DeimosC2 is a post-exploitation Command & Control (C2) tool that leverages multiple communication
HackerEnv : Sweep IPs & Scan Ports, Vulnerabilities & Exploit Them
HackerEnv is an automation tool that quickly and easily sweep IPs and scan ports, vulnerabilities and exploit them
New tfp0 Exploit Could Lead to iOS 13.6 Jailbreak
A new tfp0 exploit has been discovered in iOS 13.6 which could eventually pave the way for its jailbreak
JSshell – A JavaScript Reverse Shell For Exploiting XSS Remotely Or Finding Blind XSS
JSshell is a JavaScript reverse shell. This using for exploit XSS remotely, help to find blind XSS.
Enumy : Linux Post Exploitation Privilege Escalation Enumeration
Enumy is an ultra fast portable executable that you drop on target Linux machine during a pentest
OS Detection Using Metasploit Framework
Metasploit is primarily a framework for developing and testing exploits
PowerSploit : A PowerShell Post-Exploitation Framework
PowerSploit is a collection of Microsoft PowerShell modules
Thoron : A Linux Post-Exploitation Framework That Exploits Linux TCP Vulnerability
Thoron Framework is a Linux post-exploitation framework that exploits Linux tcp vulnerability to get shell-like connection
Critical Zoom Zero-Day Exploits Are Being Sold For $500,000
Zoom's security issues are snowballing
Tentacle : A POC Vulnerability Verification & Exploit Framework
Tentacle is a POC vulnerability verification and exploit framework.
Load More
Popular
Download our apps
See more