Quantcast
Channel: Hackers Online Club (HOC)
Browsing all 855 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

SQLi Scanner- To Detect SQL Injection Vulnerability

SQLi Scanner- To Detect SQL Injection VulnerabilityScanQLi is a simple SQL injection scanner with some additional features. This tool can't exploit the SQLi, it just detect them. Tested on Debian...

View Article


Image may be NSFW.
Clik here to view.

Vulmap- An Open Source Online Local Vulnerability Scanner Project

Vulmap- An Open Source Online Local Vulnerability Scanner ProjectIt consists of online local vulnerability scanning programs for Windows and Linux operating systems. These scripts can be used for...

View Article


Image may be NSFW.
Clik here to view.

Bashter- Web Crawler, Scanner, and Analyzer Framework

Bashter- Web Crawler, Scanner, and Analyzer Framework (Shell-Script based)Bashter is a tool for scanning a Web-based Application. Bashter is very suitable for doing Bug Bounty or Penetration Testing....

View Article

Image may be NSFW.
Clik here to view.

OSquery- SQL Powered Operating System Instrumentation, Monitoring And Analytics

OSQuery- SQL Powered Operating System Instrumentation, Monitoring And Analyticsosquery is a SQL powered operating system instrumentation, monitoring, and analytics framework.Available for Linux, macOS,...

View Article

Image may be NSFW.
Clik here to view.

FinalRecon- OSINT Tool For All-In-One Web Reconnaissance

FinalRecon- OSINT Tool for All-In-One Web ReconnaissanceFinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with...

View Article


Image may be NSFW.
Clik here to view.

Terminus- Terminal Emulator For Windows, MacOS And Linux

Terminus is a highly configurable terminal emulator for Windows, macOS and LinuxTheming and color schemesFully configurable shortcutsSplit panesRemembers your tabsPowerShell (and PS Core), WSL,...

View Article

Image may be NSFW.
Clik here to view.

Sojobo - A Binary Analysis Framework

Sojobo - A Binary Analysis FrameworkSojobo is an emulator for the B2R2 framework. It was created to easier the analysis of potentially malicious files. It is totally developed in .NET so you don't need...

View Article

Image may be NSFW.
Clik here to view.

IPFinder CLI (Command Line Interface) - To Locate and Identify Website...

IPFinder CLI (Command Line Interface) - To Locate and Identify Website Visitors by IP AddressSupports Single IP Address, asn, ranges, firewall as InputSupports BulkExports Results to Screen or to An...

View Article


Image may be NSFW.
Clik here to view.

TOR Router- To Use As Transparent Proxy And Send Traffic Under TOR

TOR Router- A tool that allow you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) for increase privacy/anonymity without extra unnecessary code.Tor...

View Article


Image may be NSFW.
Clik here to view.

Seccubus- Easy Automated Vulnerability Scanning, Reporting And Analysis

Seccubus- Easy Automated Vulnerability Scanning, Reporting And AnalysisSeccubus automates regular vulnerability scans with various tools and aids security people in the fast analysis of its output,...

View Article

Image may be NSFW.
Clik here to view.

Learn Ethical Hacking from Scratch ($23 Value) FREE For a Limited Time - eBook

"Learn Ethical Hacking from Scratch ($23 Value) FREE For a Limited Time"Learn how to hack systems like black hat hackers and secure them like security experts.This eBook will help you:Understand...

View Article

Image may be NSFW.
Clik here to view.

Pyshark- To Allowing Python Packet Parsing Using Wireshark Dissectors

Python wrapper for tshark, allowing python packet parsing using Wireshark dissectors.Pyshark features a few "Capture" objects (Live, Remote, File, InMem). Each of those files read from their respective...

View Article

Image may be NSFW.
Clik here to view.

RedGhost - Linux Post Exploitation Framework

RedGhost- Linux post exploitation framework It designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace. PayloadsFunction to generate various encoded...

View Article


Image may be NSFW.
Clik here to view.

iKy OSINT Project - To Collect Information From E-Mail With GUI

iky OSINT Project. Collect information from a mail. Gather, Profile, Timeline.Project iKy is to collects information from an email and shows results in a nice visual interface.InstallationClone...

View Article

Image may be NSFW.
Clik here to view.

MemGuard- Secure Software Enclave For Storage of Sensitive Information in Memory

MemGuard- Secure Software Enclave For Storage of Sensitive Information in MemoryThis package attempts to reduce the likelihood of sensitive data being exposed. It supports all major operating systems...

View Article


Image may be NSFW.
Clik here to view.

USBRIP- Simple Command Live Forensic Tool For Tracking USB device

Simple command line forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux.usbrip (derived from "USB Ripper", not "USB R.I.P." astonished) is an open source forensics...

View Article

Image may be NSFW.
Clik here to view.

The Ultimate WinRM Shell For Penetration Testing

This shell is the ultimate WinRM shell for hacking/pentesting.WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol. A standard SOAP based protocol that allows...

View Article


Image may be NSFW.
Clik here to view.

CloudCheck- To Test String If A Cloudflare DNS Bypass is Possible

CloudCheck- To Test String If A Cloudflare DNS Bypass is Possible Cloudcheck is made to be used in the same folder as CloudFail. Make sure all files in this repo are in the same folder before...

View Article

Image may be NSFW.
Clik here to view.

Phantom Tap (PhanTap) - An ‘Invisible’ Network Tap

Phantom Tap (PhanTap) - An ‘Invisible’ Network Tap Aimed at Red Teams.With limited physical access to a target building, this tap can be installed inline between a network device and the corporate...

View Article

Image may be NSFW.
Clik here to view.

PowerHub- A Post Exploitation Suite To Bypass Endpoint Protection

PowerHub- A Post Exploitation Suite To Bypass Endpoint ProtectionPowerHub is a convenient post exploitation tool which aids a pentester in transferring files, in particular code which may get flagged...

View Article
Browsing all 855 articles
Browse latest View live