1 |
|
Android Keylogger |
11 years, 10 months |
Shinigami |
Android Keylogger |
3671 |
1 |
2 |
|
Android Game Hacking |
11 years, 10 months |
Shinigami |
Android Game hacking, cheat engine android, gamecih |
2735 |
1 |
3 |
|
Android Network Spoofer |
11 years, 10 months |
Shinigami |
ANDROID NETWORK SPOOFER hacking gurunsb |
3392 |
None |
4 |
|
Two -Factor Authentication On Wordpress |
11 years, 10 months |
Shinigami |
WordPress (Software)Two Authentication on wordpress duosecurity phones secure logins protecting company account mobile |
2786 |
3 |
5 |
|
Introduction To Webgoat |
11 years, 9 months |
Shinigami |
WebGoat, TTP Splitting and Cache Poisining, Bypass Client Side JavaScript Validation, Bypass a Role Based Access Control Scheme, Exploit the Forgot Password Page, Spoof an Authentication Cookie |
4063 |
None |
6 |
|
Ussd Remote Factory Reset Demo And Tutorial |
11 years, 6 months |
Shinigami |
"ussd attack" Demo USSD Remote factory reset demo and tutorial Dirty USSd wipe your Samsung Demonstration "Mobile Device" The Factory Reset vulnerability Android hacking gurunsb |
3037 |
None |
7 |
|
Basic Windows Honeypot And Ids - Kfsensor |
11 years, 6 months |
Shinigami |
Basic Windows Honeypot IDS KFSensor hacking security Ethical Hacking "Hacker (term)" Intrusion Detection System "White Hat (computer Security)" "Hacker (computer Security)" "Computer Security (Industry)" "Security (finance)" |
2891 |
None |
8 |
|
Snort On Backtrack 5 |
11 years, 6 months |
Shinigami |
Snort on Backtrack ids ips hacking Intrusion Detection |
3503 |
None |
9 |
|
Read Image Gps Tag -Exif Data Viewers |
11 years, 4 months |
Shinigami |
forensics |
3392 |
None |
10 |
|
Backtrack 5 R3 Dns Analysis :- Dnsrecon |
11 years, 4 months |
Shinigami |
-DNSRECON, hacking backtrack5 r3 |
3646 |
None |
11 |
|
Backtrack 5 R3 Forensic :- Dc3dd |
11 years, 4 months |
Shinigami |
Backtrack 5 R3 Forensic :- Dc3dd gps tag gurunsb |
3451 |
None |
12 |
|
Backtrack 5 R3 :- Wpscan |
11 years, 4 months |
Shinigami |
WordPress hacking wpscan gurnsb User Enumeration Hacking |
2920 |
None |
13 |
|
Backtrack 5 R3 Forensic :- Recoverjpg |
11 years, 4 months |
Shinigami |
Backtrack 5 R3 Forensic :- Recoverjpg |
3451 |
None |
14 |
|
Dump Memory Passwords With Pmdump Like Filezilla |
11 years, 3 months |
Shinigami |
Pmdump programs and Strings |
2555 |
1 |
15 |
|
Security Tool :- Pyloris Ddos Tool |
11 years, 1 month |
Shinigami |
Security Tool :- Pyloris DDOS tool |
3378 |
None |
16 |
|
Security Tool :- Ghost Phisher Tool |
11 years, 1 month |
Shinigami |
Ghost Phisher is Fake DNS Server, Fake DHCP Server, Fake HTTP server |
5001 |
None |
17 |
|
Android Swiftkey Keylogger |
11 years, 1 month |
Shinigami |
Android swiftkey keylogger malware |
2477 |
None |
18 |
|
Measuresoft Scadapro Exploit |
11 years |
Shinigami |
Measuresoft ScadaPro exploit hacking |
1911 |
None |
19 |
|
Android Gesture Key Decode |
10 years, 11 months |
Shinigami |
Android gesture key decode |
4733 |
None |
20 |
|
Android App :- Droidsqli |
10 years, 11 months |
Shinigami |
Android App :- Droidsqli Android (Software), Software (Industry)Time based injection, - Blind injection, - Error based injection, - Normal injection |
3804 |
1 |
21 |
|
Metasploitable 2 :- Druby |
10 years, 11 months |
Shinigami |
Metasploitable 2 :- DRuby |
2072 |
None |
22 |
|
Metasploitable 2 :-Vsftpd |
10 years, 11 months |
Shinigami |
Metasploitable 2 :-Vsftpd |
1451 |
None |
23 |
|
Metasploitable 2 :-Java Rmi |
10 years, 11 months |
Shinigami |
Metasploitable 2 :-Java RMI |
1654 |
None |
24 |
|
Metasploitable 2 :-Php Cgi |
10 years, 11 months |
Shinigami |
Metasploitable 2 :-PHP CGI |
1821 |
None |
25 |
|
Metasploitable 2 :-Samba |
10 years, 11 months |
Shinigami |
Metasploitable 2 :-Samba |
2211 |
None |
26 |
|
Metasploitable 2 :- Unrealircd |
10 years, 11 months |
Shinigami |
Metasploitable 2 :- UnrealIRCD |
1624 |
None |
27 |
|
Setup Voip Pentest Lab (Pbx) |
10 years, 10 months |
Shinigami |
Business Telephone System, Voice Over IP (Industry), Trixbox - Quick Install & Phone Ring Tutorial, imple VoIP interception 1 |
3437 |
None |
28 |
|
Simple Voip Call Interception (Eavesdropping ) |
10 years, 10 months |
Shinigami |
Business Telephone System, Voice Over IP (Industry), Trixbox - Quick Install & Phone Ring Tutorial, imple VoIP interception 1, Simple VoIP Call interception, hacking, hacking voip |
4030 |
1 |
29 |
|
Enumerating Voip Hosts :- Smap |
10 years, 10 months |
Shinigami |
Enumerating VoIP Hosts :- Smap |
2763 |
None |
30 |
|
Spoofing Caller Id In Voip Network |
10 years, 10 months |
Shinigami |
Spoofing Caller ID In VOIP network |
2760 |
None |
31 |
|
Scanning Sip Enabled Devices |
10 years, 9 months |
Shinigami |
Scanning SIP Enabled Devices |
2723 |
None |
32 |
|
Crack Sip Hash With :- Sipcrack |
10 years, 9 months |
Shinigami |
Crack Sip Hash With :- Sipcrack |
3490 |
None |
33 |
|
Image Forensics And Error Level Analysis |
10 years, 5 months |
Shinigami |
Image Forensics and Error Level Analysis |
1999 |
None |
34 |
|
Android Pattern Lock Crack |
10 years, 5 months |
Shinigami |
android pattern lock crack |
2802 |
None |