A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks.
Running both components Set up variables in config.env:
NOBLE_HCI_DEVICE_ID : noble (“central”, ws-slave) device
BLENO_HCI_DEVICE_ID : bleno...
Scan Google (or other) search results for vulnerabilities.
dorkbot is a modular command-line tool for performing vulnerability scans against sets of webpages returned by Google search queries or other supported sources. It is broken up into two sets of modules:
Indexers - modules that return a...
OWASP Passfault evaluates passwords and enforces password policy in a completely different way. https://passfault-hrd.appspot.com
Running the Command-line Interface:
install java 8 jdk
Running the jsonWebService:
Hello carders are you feeling hungry? Well, you’re in luck because in this latest article/tutorial we will be discussing how you can order a pizza from Dominos using a CC with just enough balance to cover your order in 2022.
Strange enough it will work for lazy carders as well as there is no...
Recently i have worked with Mozilla Firefox 4 and advanced version 5. It is annoying me. The following does not supported by advanced version of Firefox .
Internet Download Manager Plugin. My favorite downloading software is supported by mozilla firefox. What the hell is it? But i fix this...
Hi Break The Security hackers, this is just screen shot. The Detailed Text version tutorial can be found in this link:
How to hack Windows accounts Password with Ophcrack?
I have separated it into two parts because of too large number of Screen shots.
The sole aim of this article is to disclose the truth behind carding to the general public. Therefore, every reader is responsible for the consequences of indulging in the carding format.
History of Carding
The origin of carding is in the U.S. in the 1980s, during which the BBSes...
Here is a list of some cardable sites in the UK…Enjoy
f you are engaged in virtual carding, then you cannot do without these software.
The basis of any anonymity is the ability to work without traffic leaks. Especially when it comes to practicing virtual carding. This opportunity gives Proxifier. With this program you will be able to...
If you are engaged in virtual carding or plan to start, you should understand that you should pay special attention to security. In this article I will tell you what are the ways of protection and the differences between it. I remind you that virtual carding is making online purchases when you...
Cangibrina is a Python-based multi platform admin dashboard finder tool which aims to obtain the location of website dashboards by using brute-force, wordlists, Google, Nmap and robots.txt.
It is multi-threaded, supports modifying your user agent, using a TOR proxy, custom dorks, Nmap...
This tools is continued from Nefix, DirsPy and Xmasspy project.
Will work fine in the debian shade operating system, like Backbox, Ubuntu or Kali linux.
Extract mikrotik credential (user.dat)
Reverse IP lookup
Mac address sniffer
Online md5 cracker...
A tool to quickly bruteforce and enumerate valid Active Directory accounts through Kerberos Pre-Authentication
Grab the latest binaries from the releases page to get started.
This tool grew out of some bash scripts I wrote a few years ago to perform bruteforcing using the Heimdal...
FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease.
FinalRecon provides detailed information such as:
SSL Certificate Details
Found Flag in SSL Certificate...
Recon-Tool made for reconnaissance and information gathering with an emphasis on simplicity.
It will do everything from.
Information Security Headers
Credit Card Number
US Social Security Number
Dom Paramter Url