1 |
 |
Android Keylogger |
10 years, 7 months |
Shinigami |
Android Keylogger |
3305 |
1 |
2 |
 |
Android Game Hacking |
10 years, 7 months |
Shinigami |
Android Game hacking, cheat engine android, gamecih |
2412 |
1 |
3 |
 |
Android Network Spoofer |
10 years, 7 months |
Shinigami |
ANDROID NETWORK SPOOFER hacking gurunsb |
3068 |
None |
4 |
 |
Two -Factor Authentication On Wordpress |
10 years, 7 months |
Shinigami |
WordPress (Software)Two Authentication on wordpress duosecurity phones secure logins protecting company account mobile |
2434 |
3 |
5 |
 |
Introduction To Webgoat |
10 years, 6 months |
Shinigami |
WebGoat, TTP Splitting and Cache Poisining, Bypass Client Side JavaScript Validation, Bypass a Role Based Access Control Scheme, Exploit the Forgot Password Page, Spoof an Authentication Cookie |
3731 |
None |
6 |
 |
Ussd Remote Factory Reset Demo And Tutorial |
10 years, 3 months |
Shinigami |
"ussd attack" Demo USSD Remote factory reset demo and tutorial Dirty USSd wipe your Samsung Demonstration "Mobile Device" The Factory Reset vulnerability Android hacking gurunsb |
2742 |
None |
7 |
 |
Basic Windows Honeypot And Ids - Kfsensor |
10 years, 3 months |
Shinigami |
Basic Windows Honeypot IDS KFSensor hacking security Ethical Hacking "Hacker (term)" Intrusion Detection System "White Hat (computer Security)" "Hacker (computer Security)" "Computer Security (Industry)" "Security (finance)" |
2552 |
None |
8 |
 |
Snort On Backtrack 5 |
10 years, 3 months |
Shinigami |
Snort on Backtrack ids ips hacking Intrusion Detection |
3171 |
None |
9 |
 |
Read Image Gps Tag -Exif Data Viewers |
10 years, 2 months |
Shinigami |
forensics |
2971 |
None |
10 |
 |
Backtrack 5 R3 Dns Analysis :- Dnsrecon |
10 years, 1 month |
Shinigami |
-DNSRECON, hacking backtrack5 r3 |
3310 |
None |
11 |
 |
Backtrack 5 R3 Forensic :- Dc3dd |
10 years, 1 month |
Shinigami |
Backtrack 5 R3 Forensic :- Dc3dd gps tag gurunsb |
3007 |
None |
12 |
 |
Backtrack 5 R3 :- Wpscan |
10 years, 1 month |
Shinigami |
WordPress hacking wpscan gurnsb User Enumeration Hacking |
2589 |
None |
13 |
 |
Backtrack 5 R3 Forensic :- Recoverjpg |
10 years, 1 month |
Shinigami |
Backtrack 5 R3 Forensic :- Recoverjpg |
3109 |
None |
14 |
 |
Dump Memory Passwords With Pmdump Like Filezilla |
10 years |
Shinigami |
Pmdump programs and Strings |
2245 |
1 |
15 |
 |
Security Tool :- Pyloris Ddos Tool |
9 years, 11 months |
Shinigami |
Security Tool :- Pyloris DDOS tool |
3029 |
None |
16 |
 |
Security Tool :- Ghost Phisher Tool |
9 years, 11 months |
Shinigami |
Ghost Phisher is Fake DNS Server, Fake DHCP Server, Fake HTTP server |
4639 |
None |
17 |
 |
Android Swiftkey Keylogger |
9 years, 10 months |
Shinigami |
Android swiftkey keylogger malware |
2162 |
None |
18 |
 |
Measuresoft Scadapro Exploit |
9 years, 9 months |
Shinigami |
Measuresoft ScadaPro exploit hacking |
1580 |
None |
19 |
 |
Android Gesture Key Decode |
9 years, 8 months |
Shinigami |
Android gesture key decode |
4305 |
None |
20 |
 |
Android App :- Droidsqli |
9 years, 8 months |
Shinigami |
Android App :- Droidsqli Android (Software), Software (Industry)Time based injection, - Blind injection, - Error based injection, - Normal injection |
3139 |
1 |
21 |
 |
Metasploitable 2 :- Druby |
9 years, 8 months |
Shinigami |
Metasploitable 2 :- DRuby |
1685 |
None |
22 |
 |
Metasploitable 2 :-Vsftpd |
9 years, 8 months |
Shinigami |
Metasploitable 2 :-Vsftpd |
1159 |
None |
23 |
 |
Metasploitable 2 :-Java Rmi |
9 years, 8 months |
Shinigami |
Metasploitable 2 :-Java RMI |
1362 |
None |
24 |
 |
Metasploitable 2 :-Php Cgi |
9 years, 8 months |
Shinigami |
Metasploitable 2 :-PHP CGI |
1453 |
None |
25 |
 |
Metasploitable 2 :-Samba |
9 years, 8 months |
Shinigami |
Metasploitable 2 :-Samba |
1913 |
None |
26 |
 |
Metasploitable 2 :- Unrealircd |
9 years, 8 months |
Shinigami |
Metasploitable 2 :- UnrealIRCD |
1325 |
None |
27 |
 |
Setup Voip Pentest Lab (Pbx) |
9 years, 7 months |
Shinigami |
Business Telephone System, Voice Over IP (Industry), Trixbox - Quick Install & Phone Ring Tutorial, imple VoIP interception 1 |
2965 |
None |
28 |
 |
Simple Voip Call Interception (Eavesdropping ) |
9 years, 7 months |
Shinigami |
Business Telephone System, Voice Over IP (Industry), Trixbox - Quick Install & Phone Ring Tutorial, imple VoIP interception 1, Simple VoIP Call interception, hacking, hacking voip |
3630 |
1 |
29 |
 |
Enumerating Voip Hosts :- Smap |
9 years, 7 months |
Shinigami |
Enumerating VoIP Hosts :- Smap |
2417 |
None |
30 |
 |
Spoofing Caller Id In Voip Network |
9 years, 7 months |
Shinigami |
Spoofing Caller ID In VOIP network |
2436 |
None |
31 |
 |
Scanning Sip Enabled Devices |
9 years, 7 months |
Shinigami |
Scanning SIP Enabled Devices |
2392 |
None |
32 |
 |
Crack Sip Hash With :- Sipcrack |
9 years, 7 months |
Shinigami |
Crack Sip Hash With :- Sipcrack |
3122 |
None |
33 |
 |
Image Forensics And Error Level Analysis |
9 years, 2 months |
Shinigami |
Image Forensics and Error Level Analysis |
1676 |
None |
34 |
 |
Android Pattern Lock Crack |
9 years, 2 months |
Shinigami |
android pattern lock crack |
2493 |
None |