Home / Tech


Ut wisi luctus ullamcorper. Et ullamcorper sollicitudin elit odio consequat mauris, wisi velit tortor semper vel feugiat dui, ultricies lacus. Congue mattis luctus, quam orci mi semper

The ExchangeRelayX – OWA for hackers

  This instrument provides the attacker with an OWA looking interface, with access to the user’s contacts and mailbox. Features Raw XML accessibility to the EWS host, so you can send requests to features and functions that were not pre-programmed in exchangeRelayx Insert redirecting rules to the sufferer’s email for …

Read More »

The Detect Evil Maid Attacks: Do Not Disturb

Among the best ways to undermine a computer is with physical access. A lot of us have likely left our laptops unattended (possibly in a hotel room while traveling?). It would be nice to know if somebody attempted to hack it! Do Not Disturb (DND) continually monitors your system for …

Read More »

BlackEye – The Most Complete Phishing Tool, With 32 Templates +1

Blackeye is an update from first shellfish tool by the Linux choice under GNU license. BLACKEYE is the most complete Phishing Tool, with 32 templates +1 customizable and it works only on LAN. Blackeye Usage git clone https://github.com/thelinuxchoice/blackeye Cd blackeye bash blackeye.sh Disclaimer This tool was made for instructional purposes! …

Read More »

Microsoft Research Detours Package

Detours have been utilized by several ISVs and can be employed by product groups at Microsoft. Detours are currently available under a typical open source license (MIT). This simplifies licensing for developers using Detours and enables the community to encourage Detours using open source applications and procedures. Detours is a …

Read More »

r0ak – Ring 0 Army Knife

Motivation The Windows kernel is a rich environment where countless drivers execute on a typical system, and where thousands of variables containing worldwide state are present. For advanced troubleshooting, IT specialists will typically use tools like the Windows Debugger (WinDbg), SysInternals Tools, or compose their own. Unfortunately, use of those …

Read More »

UBoat – A POC HTTP Botnet Project

UBoat HTTP is a POC HTTP Botnet designed to replicate a full weaponized business botnet. UBoat Uses Coded at C++ with no dependencies Encrypted C&C Communications Persistence to Stop your control being missing Link Redundancy (Uses a fallback host address or domain ) DDoS methods (TCP & UDP Flood) Task …

Read More »

Laforge — Security Competition Infrastructure Automation Framework

Laforge enables rapid development of infrastructure for the purpose of data security contests. Utilizing a straightforward and intuitive configuration speech, Laforge oversees a dependence graph and state management and permits for highly productive distant collaboration. The Laforge engine uses a custom loader to perform multi-dimensional, non-destructive configuration overlay. A fantastic …

Read More »

Battlefield Dangerous Corporate three

Battlefield Dangerous Corporate threeQ

A new battlefield in the realm of hormone replacement therapy and women’s health was created with the introduction of the Wiley Protocol. On the flip side, many enemies now wear body armor, which means you need your bullets in order to punch through THAT. Weapons come in all types of …

Read More »

Powered by keepvid themefull earn money