Quantcast
Channel: Hackers Online Club (HOC)
Browsing all 25 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

TOR Router- To Use As Transparent Proxy And Send Traffic Under TOR

TOR Router- A tool that allow you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) for increase privacy/anonymity without extra unnecessary code. Tor...

View Article



Image may be NSFW.
Clik here to view.

Seccubus- Easy Automated Vulnerability Scanning, Reporting And Analysis

Seccubus- Easy Automated Vulnerability Scanning, Reporting And AnalysisSeccubus automates regular vulnerability scans with various tools and aids security people in the fast analysis of its output,...

View Article

Image may be NSFW.
Clik here to view.

Learn Ethical Hacking from Scratch ($23 Value) FREE For a Limited Time - eBook

"Learn Ethical Hacking from Scratch ($23 Value) FREE For a Limited Time" Learn how to hack systems like black hat hackers and secure them like security experts.This eBook will help you:Understand...

View Article

Image may be NSFW.
Clik here to view.

Pyshark- To Allowing Python Packet Parsing Using Wireshark Dissectors

Python wrapper for tshark, allowing python packet parsing using Wireshark dissectors. Pyshark features a few "Capture" objects (Live, Remote, File, InMem). Each of those files read from their...

View Article

Image may be NSFW.
Clik here to view.

RedGhost - Linux Post Exploitation Framework

RedGhost- Linux post exploitation framework It has designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace. Payloads Function to generate various encoded...

View Article


Image may be NSFW.
Clik here to view.

iKy OSINT Project - To Collect Information From E-Mail With GUI

iky OSINT Project. Collect information from a mail. Gather, Profile, Timeline. Project iKy is to collects information from an email and shows results in a nice visual interface.InstallationClone...

View Article

Image may be NSFW.
Clik here to view.

MemGuard- Secure Software Enclave For Storage of Sensitive Information in Memory

MemGuard- Secure Software Enclave For Storage of Sensitive Information in Memory This package attempts to reduce the likelihood of sensitive data being exposed. It supports all major operating systems...

View Article

Image may be NSFW.
Clik here to view.

USBRIP- Simple Command Live Forensic Tool For Tracking USB device

Simple command line forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux.usbrip (derived from "USB Ripper", not "USB R.I.P." astonished) is an open source forensics...

View Article


Image may be NSFW.
Clik here to view.

The Ultimate WinRM Shell For Penetration Testing

This shell is the ultimate WinRM shell for hacking/pentesting.WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol.  A standard SOAP based protocol that allows...

View Article


Image may be NSFW.
Clik here to view.

CloudCheck- To Test String If A Cloudflare DNS Bypass is Possible

CloudCheck- To Test String If A Cloudflare DNS Bypass is Possible  Cloudcheck is made to be used in the same folder as CloudFail. Make sure all files in this repo are in the same folder before using....

View Article

Image may be NSFW.
Clik here to view.

Phantom Tap (PhanTap) - An ‘Invisible’ Network Tap

Phantom Tap (PhanTap) - An ‘Invisible’ Network Tap Aimed at Red Teams.With limited physical access to a target building, this tap can be installed inline between a network device and the corporate...

View Article

Image may be NSFW.
Clik here to view.

PowerHub- A Post Exploitation Suite To Bypass Endpoint Protection

PowerHub- A Post Exploitation Suite To Bypass Endpoint ProtectionPowerHub is a convenient post exploitation tool which aids a pentester in transferring files, in particular code which may get flagged...

View Article

Image may be NSFW.
Clik here to view.

Slurp- To Security Audits of S3 Buckets Enumerator

Slurp- Blackbox/Whitebox S3 Bucket EnumeratorTo Evaluate the security of S3 bucketsOverviewCredit to all the vendor packages to develop Slurp possible.Slurp is for pen-testers and security...

View Article


Image may be NSFW.
Clik here to view.

Burp Suite Extension - To Monitor And Keep Track of Tested Endpoints

Burp Scope Monitor ExtensionA Burp Suite Extension to monitor and keep track of tested endpoints.Main FeaturesSimple, easy way to keep track of unique endpoints when testing an applicationMark...

View Article

Image may be NSFW.
Clik here to view.

Findomain- Fastest And Cross-platform Subdomain Enumerator

FinDomain- Fastest And Cross-platform Subdomain Enumerator.Comparison It comparison gives you a idea why you should use findomain instead of another enumerators. The domain used for the test was...

View Article


Image may be NSFW.
Clik here to view.

PostShell - Post Exploitation Bind/Backconnect Shell

PostShell - Post Exploitation Bind/Backconnect Shell PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which allows for job...

View Article

Image may be NSFW.
Clik here to view.

Dolos Cloak- For Network Penetration Testers To Automated 802.1x Bypass

Dolos Cloak- Automated 802.1x Bypass Dolos Cloak is a python script designed to help network penetration testers and red teamers bypass 802.1x solutions by using an advanced man-in-the-middle attack....

View Article


Image may be NSFW.
Clik here to view.

Penta- Open Source All-in-one CLI To Automate Pentesting

Penta (PENTest + Automation tool) is Pentest automation tool using Python3.InstallationInstall requirements penta requires the following packages.Python3.7pipenv Resolve python package dependency.$...

View Article

Image may be NSFW.
Clik here to view.

TraXSS - Automated XSS Vulnerability Scanner

Automated Vulnerability Scanner for XSS Written in Python3  Traxss is an automated framework to scan URLs and webpages for XSS Vulnerabilities. It includes over 575 Payloads to test with and multiple...

View Article

Image may be NSFW.
Clik here to view.

Hacking for Dummies, 6th Edition ($29.99 Value) Free

"Hacking for Dummies, 6th Edition ($29.99 Value) Free for a Limited Time"Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker’s mindset and with...

View Article
Browsing all 25 articles
Browse latest View live




Latest Images