Tag Archives: hacker

XtremeRAT 3.5 Private
04 Dec

XtremeRAT 3.5 Private

XtremeRAT Remote Access Trojan or Remote Administration Tool. it is used mainly to gain access to your computers but there are many uses for a RAT, I will provide most of them. Ability to control and view screen File management (Upload, Execute, Download, etc) Shell Access (CMD) Computer Power Access (Power off, log off, etc)

Read More
andriod
03 Dec

Hacking Users On Same Wifi With Android (VIP)

  mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network.

Read More
SafeLoader 2.5
27 Nov

SafeLoader 2.5

  SafeLoader is opensource Botnet, with good functions and stable, The builder is .vbs file simple and easy to setup.

Read More
SQLi Dumper v.7
27 Nov

SQLi Dumper v.7

SQLi Dumper v.7 – Tool to find bugs errors or vulnerabilities in MySQL database Functions SQL Injection Operation System Function Dump Database Extract Database Schema Search Columns Name Read File (read only) Create File (read only) Brute Table & Column and more…

Read More
dendroid p12
27 Nov

Dendroid Android Http Remote Administration Tool Full Source

Android remote administrator tool with online panel with apk binder. features Delete call logs Call a phone number Open Web pages Record calls and audio Intercept text messages Take and upload photos and videos Open an application Initiate a HTTP flood (DoS) for a period of time Change the command-and-control (C&C) server  

Read More
wfk_1_thumb
27 Nov

Wifi Kill 2.2

  Well, with this app you can disable internet connection for a device on the same network. So if someone (anyone) is abusing the internet wasting precious bandwidth you could just kill their connection and stay happy with a full bandwidth just for yourself.

Read More
SQLi-DB
23 Nov

SQLi-DB

This application will help to to find vulnerable SQL for injection  

Read More
Page 1 of 212