Tagged: system

0

Commix

  Commix Package Description Commix (short for [comm]and [i]njection e[x]ploiter) has a simple environment and it can be used, from web developers, penetration testers or even security researchers to test web applications with the...

0

cisco-torch

    cisco-torch Package Description Cisco Torch mass scanning, fingerprinting, and exploitation tool was written while working on the next edition of the “Hacking Exposed Cisco Networks”, since the tools available on the market...

0

BeEF

  BeEF Package Description BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser. Amid growing concerns about web-borne attacks against clients, including mobile...

0

Backdoor Factory

  Backdoor Factory Backdoor Factory Package Description The goal of BDF is patch executable binaries with user desidered shellcode and continue normal execution of the prepatched state. Supporting: Windows PE x32/x64 and Linux ELF...

0

Android Unlock Phone Codes

These codes are use to access hidden menus of the android operating system. Some phone manufactures are hidened this menus permanently.   *#0*# -> Galaxy S3 service menu. ##7764726 -> Motorola DROID hidden service...

0

Android Secret Codes for View Firmware Informations

These Secret code commonly use phone repairing peoples and the programmers. *#*#1111#*#* -> Let you know about FTA SW Version. *#*#2222#*#* -> FTA Hardware Version. *#*#4986*2650468#*#* -> Firmware Info PDA, Phone, H/W, RFCallDate. *#*#1234#*#*...

0

JX-Reader Library v1.0.1

It is a networking library Example: when client application send a request to server over an HTTP request, the back end could be handled by this library. Mobile app designers getting better and better...