network-security

  1. BEST OPEN SOURCE HACKING TOOLS

    Hidden content
  2. HACK 1000+ WIFI NETWORKS PER DAY. SO YOU WANT TO BE A HACKER? - START HERE - SIMPLER.

    Was helping someone recently and came across an easier to follow way to achieve the same result with less issues so this is an easy tutorial in a thread. What can this be useful for? . Use legally at your own discretion - this tutorial is strictly for educational purposes. Hidden contentHidden...
  3. ⭐HACKING WIFI WITH REAVER IN KALI ⭐

    Hacking WiFi with Reaver in Kali Hidden content
  4. ⭐MAN IN THE MIDDLE ATTACK ⭐COURSES, TOOLS, MORE!☢️

    Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves between a user and a website. Attackers have many different reasons and methods for using a MITM attack. Typically, they’re trying to steal something, like credit card numbers or user login credentials. Sometimes they’re...
  5. DDOS ATTACK TOOL FOR TERMUX

    Hidden content
  6. TORAT - OPEN SOURCE RAT OVER TOR

    "ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication" This guy is making what I think all RATs should be. Check it out and if you're a go programmer maybe even contribute. Hidden content "Current Features RPC (Remote procedure...
  7. [✨UBOAT BOTNET✨] HIDDEN RDP ⭐ TASK CREATION

    UBoat Botnet IS MADE FOR EDUCATIONAL PURPOSES AND PENTESTING ONLY USE YOUR BRAIN WHEN USING IT RESPECT OPSEC AND THE TOOL Hidden content Virustotal link VirusTotal
  8. FIND VULN ON MULTIPLE TARGET AUTOMATICALLY

    Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the internet. It helps you find vulnerabilities in your applications, APIs, networks, DNS, and cloud...
  9. MAC ADDRESS CHANGER [] STAY ANONYMOUS WHILE CRACKING, HACKING, ETC)

    HERE - Hidden content
  10. QUASAR RAT -OPEN SOURCE (STEALER,SOCKS5,REMOTE DEKSTOP & MORE)

    Supported runtimes and operating systems .NET Framework 4.5.2 or higher Supported operating systems (32- and 64-bit) Windows 10 Windows Server 2019 Windows Server 2016 Windows 8/8.1 Windows Server 2012 Windows 7 Windows Server 2008 Windows Vista Features TCP network stream (IPv4 & IPv6...
  11. WIRETAP NETWORK =A NETWORK PACKET AND TRAFFIC INTERCEPTOR {NEW TOOL}

    all data sent by the target gets redirected through the attacker (MiTM) This is the first version of the tool so please contact the developer if you want to help contribute and add more to tool,CONTACT ON GITHUB .JOIN DISCORD SERVER . here link for tool ==== Hidden content supports IPv4...
  12. ⚡ XEROSPLOIT ⚡ MAN IN THE MIDDLE TOOLKIT ⚡

    Features: Network mapping, Port scanning, Code injection & More. Leave a like for more Download: Hidden contentHidden contentHidden content
  13. BDFPROXY – PATCH BINARIES VIA MITM

    Hidden content
  14. NETWORK FOOTPRINT SCANNER PLATFORM - DISCOVER DOMAINS AND RUN YOUR CUSTOM CHECKS

    Hidden content
  15. SUDOMY - SUBDOMAIN ENUMERATION TOOL

    Sudomy - Subdomain Enumeration & Analysis tool. This tool is created using a bash script, to analyze domains and collect subdomains in a fast and comprehensive way (Easy, light, fast, and powerful). Features:- 1. Easy, light, fast, and powerful. The bash script is available by default in almost...
  16. GET THE IP OF SOMEONE THE HARD WAY USING TERMUX

    Hidden content
  17. ⚡✅ HACK COMPUTER ON PORT 80 ⚡✅

    Hidden content
  18. HOW TO TAKE DOWN WEBSITES (APACHE SERVERS WORK BEST)

    Hidden content
  19. TUTORIAL ON HOW TO SCAN ANY NETWORK WITH NMAP LATEST METHOD [HQ]

    Hidden content
  20. [PDF HANDBOOK] NMAP CHEAT SHEET

    Download nmap_cheet_sheet_v7.pdf : Hidden content
  21. CONTROL NETWORK TRAFFIC WITH EVIL LIMITER TO THROTTLE OR KICK OFF DEVICES

    Hidden content
  22. ⚡✅ FOOLING THE SERVER TO BYPASS RATE LIMITS. ⚡✅

    Hidden content
  23. BDFPROXY – PATCH BINARIES VIA MITM – BACKDOORFACTORY + MITMPROXY REQ: KALI OR LINUX V

    Hidden content
  24. Doxbin.net 10.11.2025 by BengaminButton

    Doxbin.net 10.11.2025 by BengaminButton date: 10.11.2025 site: doxbin.net format: json Total volume: 76,000+ records Users: 30,000+ accounts Period: ~2008-2025 Format: JSON/RAW sample: { "id": 304244, "title": "Zeykuw / Yanis Zyan", "link"...
  25. How to crack RDPs

    Hidden content
  26. REPEATABLE HQ PAID PROXY METHOD FOR FREE

    Hidden content
  27. Hbgary

    HBGary Hidden content
  28. ⭐ SilverBullet Config Pack V8 ⭐

    Hidden content