Quantcast
Channel: Hackers Online Club (HOC)
Browsing all 855 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Lazygit- A Simple UI Terminal For GIT Commands

A simple Terminal UI for git commands, written in Go with the gocui library.Are YOU tired of typing every git command directly into the terminal, so this simple UI terminal for you.InstallationVia...

View Article


Image may be NSFW.
Clik here to view.

Fingerprinting Organizations With Collected Archives (FOCA)- A Tool To Find...

FOCA (Fingerprinting Organizations with Collected Archives) is a tool used mainly to find metadata and hidden information in the documents its scans. These documents may be on web pages, and can be...

View Article


Image may be NSFW.
Clik here to view.

Vba2Graph- A Tool For Security Researchers For Malware Analysis

Vba2Graph: A tool for security researchers to Analysis of Malware.Allows for quick analysis of malicious macros, and easy understanding of the execution flow.It Generates a VBA call graph for easier...

View Article

Image may be NSFW.
Clik here to view.

BillCipher - The Information Gathering Tool For A Website or IP Address

BillCipher - The Information Gathering Tool For A Website or IP Address The new version BillCipher 2.2, use some ideas from Devploit. BillCipher can work in any operating system if they have and...

View Article

Image may be NSFW.
Clik here to view.

badKarma - Advanced Network Reconnaissance Toolkit For Penetration Testing

badKarma - Advanced Network Reconnaissance Toolkit For Penetration Testing.badKarma is a python3 GTK+ toolkit that aim to assist penetration testers during all the network infrastructure penetration...

View Article


Image may be NSFW.
Clik here to view.

Hacking The Hacker ($13 Value) FREE For a Limited Time

Hacking The Hacker ($13 Value) FREE For a Limited TimeMeet the world's top ethical hackers and explore the tools of the trade.Cybersecurity is becoming increasingly critical at all levels, from retail...

View Article

Image may be NSFW.
Clik here to view.

NUBIA- A Command-line And Interactive Shell Framework

 NUBIA- A Command-line And Interactive Shell FrameworkNubia is a lightweight framework for building command-line applications with Python. It was originally designed for the “logdevice interactive...

View Article

Image may be NSFW.
Clik here to view.

Droidefense- Advance Android Malware Analysis Framework

Droidefense: Advance Android Malware Analysis FrameworkDroidefense (originally named atom: analysis through observation machine) is the codename for android apps/malware analysis/reversing tool. It was...

View Article


Image may be NSFW.
Clik here to view.

PacketWhisper- A Stealthily Transfer Data and Defeat Attribution Using DNS...

PacketWhisper  is a Stealthily Transfer Data & Defeat Attribution Using DNS Queries & Text-Based Steganography, without the need for attacker-controlled Name Servers or domains; Evade DLP/MLS...

View Article


Image may be NSFW.
Clik here to view.

HashPump- A Tool To Exploit The Hash Length Extension Attack in Various...

HashPump-  A Tool To Exploit The Hash Length Extension Attack in Various Hashing AlgorithmsCurrently supported algorithms: MD5, SHA1, SHA256, SHA512.Help Menu$ hashpump -hHashPump [-h help] [-t test]...

View Article

Image may be NSFW.
Clik here to view.

SubScraper- A Pentest Tool To Find Information of Subdomain

SubScraper- A Pentest Tool To Find Information of SubdomainExternal pentest tool that performs subdomain enumeration through various techniques. In addition, SubScraper will provide information such as...

View Article

Image may be NSFW.
Clik here to view.

ANDRAX- A Penetration Testing Platform For Android OS

ANDRAX- A Penetration Testing Platform For Android OSANDRAX has the ability to run natively on Android so it behaves like a common Linux distribution. But more powerful than a common distribution.Why...

View Article

Image may be NSFW.
Clik here to view.

HASSH - An SSH Client And Server Fingerprinting Method

HASSH -An SSH Client And Server Fingerprinting Method HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints can be...

View Article


Image may be NSFW.
Clik here to view.

Sn1per- Automated Pentest Framework For Offensive Security Experts

Sn1per- Automated Pentest Framework For Offensive Security Experts Sn1per Community Edition is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities....

View Article

Image may be NSFW.
Clik here to view.

The Ultimate Plumber- A Tool For Writing Linux Pipes in A Terminal-Based UI

The Ultimate Plumber- A Tool For Writing Linux Pipes in A Terminal-Based UIUP is the Ultimate Plumber, a tool for writing Linux pipes in a terminal-based UI interactively, with instant live preview of...

View Article


Image may be NSFW.
Clik here to view.

WebMap- Nmap Web Dashboard With Scan Information And Ports Status

WebMap- Nmap Web Dashboard and ReportingUsageYou should use this with docker, just by sending this command:$ mkdir /tmp/webmap$ docker run -d \         --name webmap \         -h webmap \         -p...

View Article

Image may be NSFW.
Clik here to view.

Osmedeus - Automatic Reconnaissance And Scanning In Penetration Testing

Osmedeus - Automatic Reconnaissance And Scanning In Penetration TestingWhat is Osmedeus?Osmedeus allow you to do boring stuff in Penetration testing automatically like reconnaissance and scanning the...

View Article


Image may be NSFW.
Clik here to view.

People Tracker On The Internet- OSINT Analysis And Research Tool

TRAPE- OSINT Analysis And Research ToolPeople tracker on the Internet: Learn to track the world, to avoid being traced.Trape is a OSINT analysis and research tool, which allows people to track and...

View Article

Image may be NSFW.
Clik here to view.

Wave-Share- Serverless, Peer-to-Peer, Local File Sharing Through Sound

Wave-Share- Serverless, peer-to-peer, local file sharing through soundA proof-of-concept for WebRTC signaling using sound. Works with all devices that have microphone + speakers. Runs in the...

View Article

Image may be NSFW.
Clik here to view.

TIDoS Framework- The Offensive Manual Web Application Penetration Testing...

TIDoS-Framework- The Offensive Manual Web Application Penetration Testing Framework.Here is some light on what the framework is all about: A complete versatile framework to cover up everything from...

View Article
Browsing all 855 articles
Browse latest View live