Recent Posts


Xerosploit is a penetration testing toolkit whose goal is to perform man in the middle attacks for testing purposes. It brings various modules that allow to realise efficient attacks, and also allows to carry out denial of service attacks and port scanning. Powered by bettercap and nmap. Dependencies nmap hping3 build-essential ruby-dev libpcap-dev libgmp3-dev tabulate […]

Read More Xerosploit


A Massive Exploiting Tool TheFatRat is an exploiting tool which compiles a malware with famous payload, and then the compiled maware can be executed on Linux , Windows , Mac and Android. TheFatRat Provides An Easy way to create Backdoors and Payload which can bypass most anti-virus. Information This tool is for educational purpose only, […]

Read More TheFatRat


TorghostNG now supports Privoxy TorghostNG is a tool that make all your internet traffic anonymized through Tor network. Rewritten from TorGhost with Python 3. TorghostNG was tested on: Kali Linux Manjaro … What’s new in TorghostNG 2.0 Add a new language: German 🇩🇪 (Thank you, Popescu-PfeifferMarc) Change langconf.txt to langconf Some functions don’t require root […]

Read More TorghostNG


DDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers). FILES Mirai edits (priv8 and public) QBot edits (priv8 and public) Exploits QBOT AND MIRAI SCANNERS Layer4 Methods Layer7 Methods UDP METHODS TCP METHODS BRUTERS VULN LISTS DSTAT Honeypots Bot compilers SELFREPS AND MORE! USING Exemple : Have […]

Read More DDOS-RootSec

Ghost Eye

Ghost Eye – Information Gathering Tool Ghost Eye New Release. Ghost Eye is an Information Gathering, Footprinting, Scanner, and Recon Tool I made in Python 3. Since the last release of Ghost Eye, I’ve tweaked, removed, and added some new features. So that Ghost Eye would become more of a whole. For me, it remains […]

Read More Ghost Eye


Advanced XSS Detection Suite XSStrike Wiki • Usage • FAQ • For Developers • Compatibility • Gallery XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler. Instead of injecting payloads and checking it works like all the […]

Read More XSStrike


InfoG InfoG ~ Information Gathering Tools [ Installation ] [ Setup ] [ Running ] [ Screenshot ]

Read More InfoG


OWASP ZAP The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by a dedicated international team of volunteers. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. It’s also a great tool for […]

Read More ZAP


All in one tool for Information Gathering and Vulnerability Scanning Version 2.0.0 Scans That You Can Perform Using RED HAWK : Basic Scan Site Title NEW IP Address Web Server Detection IMPROVED CMS Detection Cloudflare Detection robots.txt Scanner Whois Lookup IMPROVED Geo-IP Lookup Grab Banners IMPROVED DNS Lookup Subnet Calculator Nmap Port Scan Sub-Domain Scanner […]

Read More RED HAWK


All in One Hacking tool For Hackers🥇 Install Kali Linux in WIndows10 Without VirtualBox YOUTUBE Update Available V1.1.0 🚀 Added New Tools Reverse Engineering RAT Tools Web Crawling Payload Injector Multitor Tools update Added Tool in wifijamming Hackingtool Menu 🧰 Anonymously Hiding Tools Information gathering tools Wordlist Generator Wireless attack tools SQL Injection Tools Phishing […]

Read More Hackingtool

Shodan Eye

Shodan Eye This tool collects all information about all devices that are directly connected to the internet with the specified keywords that you enter. This way you get a complete overview. Here you can read the latest article about Shodan Eye: Article Install Shodan Eye on Termux can be found here: The types […]

Read More Shodan Eye


Layer7-MultiBypass Direct link : NodeJS web requests flooder, Sends massive amounts of requests to a URL with custom features and bypasses for JS challenges, it uses proxies. DONT SELL THIS SHIT The module contains several bypasses of firewalls: Cloudflare (JS challenge – UAM, Captcha partly) Stormwall BlazingFast OVH UAM PipeGuard DDoS-Guard (JS challenge) The […]

Read More Layer7-MultiBypass


INFO Low Orbit Ion Cannon (LOIC) is an open source network stress tool, written in C#. LOIC is based on Praetox’s LOIC project at . INSTALLATION (LINUX) DISCLAIMER LOIC is for educational purposes only, intended to help server owners develop a “hacker defense” attitude. This tool comes without any warranty. You may not use […]

Read More Loic


The purpose of the Whoami tool makes you as anonymous as possible on Kali linux. It is an user friendly with its ease of use and simple interface. It follows two different paths to ensure the highest possible level of anonymity. Finally, don’t forget that there is never a hundred percent security on the internet! […]

Read More WHOAMI


What is TorGhost ? TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected via tor, thus preventing DNSLeak. The scripts also disables unsafe packets exiting the system. Some packets like ping request can compromise your identity. Build and install from source git clone cd […]

Read More TorGhost


Tool-X Introduction Tool-X is a Kali Linux hacking tools installer for Termux and linux system. Tool-X was developed for Termux and linux based systems. Using Tool-X, you can install almost 370+ hacking tools in Termux (android) and other Linux based distributions. Now Tool-X is available for Ubuntu, Debian etc. A similar lightweight and fast tool […]

Read More Tool-X


Impulse Modern Denial-of-service ToolKit Main window Methods: Method Target Description SMS PHONE Sends a massive amount of SMS messages and calls to a single target EMAIL EMAIL Sends a massive amount of Email messages to a target NTP IP:PORT NTP amplification is a type of Distributed Denial of Service (DDoS) attack in which the attacker […]

Read More Impulse

Collateral Murder

5th April 2010 10:44 EST WikiLeaks has released a classified US military video depicting the indiscriminate slaying of over a dozen people in the Iraqi suburb of New Baghdad — including two Reuters news staff. Reuters has been trying to obtain the video through the Freedom of Information Act, without success since the time of […]

Read More Collateral Murder


Direct link : of Phishing is here This is official repository maintained by us @Bhavik_Tutorials You can check youtube What is Shark?? A shark is a tool that will help you do Phishing in an advanced way so no one checks and identify that you are doing phishing. For those guys who Don’t know […]

Read More SHARK


MHDDoS – DDoS Attack Script With 36 Method Coder link : (Code Lang – Python 3) Please Don’t Hit ‘.gov’ and ‘.ir’ Websites 🙂 Features And Method Layer7 GET | GET Flood POST | POST Flood OVH | Bypass OVH STRESS | Send HTTP Packet With High Byte OSTRESS | STRESS Without Proxy DYN […]

Read More MHDDOS

Receive new content directly in your inbox.