• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
ElfPack: ELF Binary Section Docking for Stageless Payload Delivery

ElfPack: ELF Binary Section Docking for Stageless Payload Delivery

June 24, 2022
Norimaci – Simple And Lightweight Malware Analysis Sandbox For macOS

Norimaci – Simple And Lightweight Malware Analysis Sandbox For macOS

June 24, 2022
CVE-2022-34305: Apache Tomcat Cross-Site Scripting Vulnerability

CVE-2022-34305: Apache Tomcat Cross-Site Scripting Vulnerability

June 24, 2022
TrelloC2 – Simple C2 Over The Trello API

TrelloC2 – Simple C2 Over The Trello API

June 24, 2022
Elliptic: Illicit Use of Dogecoin Increasing

Elliptic: Illicit Use of Dogecoin Increasing

Fraudster Charged for Using Stolen Credit Card to Buy Jewelry
Fraudster Charged for Using Stolen Credit Card to Buy Jewelry
Seven Sentenced in South Wales Drug Trafficking Case
Seven Sentenced in South Wales Drug Trafficking Case
gifts for hackers

Hacking News

Elliptic: Illicit Use of Dogecoin Increasing

Elliptic: Illicit Use of Dogecoin Increasing

- Dark Web News
June 23, 2022

The blockchain analysis firm Elliptic identified Dogecoin as a cryptocurrency increasingly linked to criminal activity, including darknet market usage. Elliptic,...

Fraudster Charged for Using Stolen Credit Card to Buy Jewelry

Fraudster Charged for Using Stolen Credit Card to Buy Jewelry

June 22, 2022
Seven Sentenced in South Wales Drug Trafficking Case

Seven Sentenced in South Wales Drug Trafficking Case

June 21, 2022
More Apartments Searched in Bavarian Darkweb Investigation

More Apartments Searched in Bavarian Darkweb Investigation

June 19, 2022
UK Home Secretary Approves Assange's Extradition

UK Home Secretary Approves Assange's Extradition

June 18, 2022
pentesting gear

Hack Tools

ElfPack: ELF Binary Section Docking for Stageless Payload Delivery

ElfPack: ELF Binary Section Docking for Stageless Payload Delivery

- Hack Tools
June 24, 2022

ElfPack: ELF Binary Section Docking for Stageless Payload Delivery Highlights Overview of payload bundling mechanisms: compilation, linking, and loading. Binary...

Norimaci – Simple And Lightweight Malware Analysis Sandbox For macOS

Norimaci – Simple And Lightweight Malware Analysis Sandbox For macOS

June 24, 2022
CVE-2022-34305: Apache Tomcat Cross-Site Scripting Vulnerability

CVE-2022-34305: Apache Tomcat Cross-Site Scripting Vulnerability

June 24, 2022
TrelloC2 – Simple C2 Over The Trello API

TrelloC2 – Simple C2 Over The Trello API

June 24, 2022

Operating Systems

BlackArch Linux v2019.09.01 – Penetration Testing Distribution

BlackArch Linux v2019.09.01 – Penetration Testing Distribution

- Operating Systems
September 9, 2019

BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers. The repository contains 2336 tools. You can...

Commando VM v2.0 – The First Full Windows-based Penetration Testing OS

Commando VM v2.0 – The First Full Windows-based Penetration Testing OS

August 9, 2019
OPS City – Build and Run Nanos Unikernels

OPS City – Build and Run Nanos Unikernels

July 9, 2019
Whonix 15 Released – Based on Debian Buster Distribution

Whonix 15 Released – Based on Debian Buster Distribution

July 3, 2019
hacker swag

Mobile Hacking

Andrill – Vulnerable Mobile Application with Various Levels

Andrill – Vulnerable Mobile Application with Various Levels

- Mobile Hacking
August 2, 2019

Andrill is an android mobile application interacting with a back-end API that is vulnerable with various levels of difficulty. It...

Yaazhini – Free Android APK & API Vulnerability Scanner

Yaazhini – Free Android APK & API Vulnerability Scanner

June 12, 2019
ANDRAX v3 – The First And Unique Penetration Testing Platform For Android Smartphones

ANDRAX v3 – The First And Unique Penetration Testing Platform For Android Smartphones

June 12, 2019June 12, 2019
PhoneSploit – Using Open Adb Ports We Can Exploit A Devive

PhoneSploit – Using Open Adb Ports We Can Exploit A Devive

May 31, 2019July 27, 2019
Top 5 Best Android Game Hacking Apps

Top 5 Best Android Game Hacking Apps

May 9, 2019May 19, 2019

Bruteforce

Brute_Force – BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix

Brute_Force – BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix

- Bruteforcing
July 21, 2019

A tool to Brute force social media, email and streaming accounts.Install Brute_forcepip install proxylist pip install mechanizegit clone https://github.com/Matrix07ksa/Brute_Force Usage: BruteForce Gmail...

Patator – Multi-Purpose Brute-Forcer with a Modular Design and a Flexible Usage

Patator – Multi-Purpose Brute-Forcer with a Modular Design and a Flexible Usage

June 30, 2019
GoBuster v3.0 –  Directory/File, DNS and VHost busting tool written in Go

GoBuster v3.0 – Directory/File, DNS and VHost busting tool written in Go

June 20, 2019
HashCK – Automated Hashcracking Tool

HashCK – Automated Hashcracking Tool

June 17, 2019

Hardware & Embedded

HAL – The Hardware Analyzer

HAL – The Hardware Analyzer

- Hardware & Embedded
June 29, 2019

HAL is a comprehensive reverse engineering and manipulation framework for gate-level netlists focusing on efficiency, extendability and portability. HAL comes...

PRET – Hacking Printer Command Languages

PRET – Hacking Printer Command Languages

May 8, 2019July 27, 2019
Bash Bunny – Multi-Functional USB Attack Device

Bash Bunny – Multi-Functional USB Attack Device

April 24, 2019
Killcast – Manipulate Chromecast Devices in your Network

Killcast – Manipulate Chromecast Devices in your Network

January 16, 2019July 27, 2019

Vulnerability Scanners

Syhunt Community 6.7 – Web And Mobile Application Scanner

Syhunt Community 6.7 – Web And Mobile Application Scanner

- Vulnerability Scanners
October 1, 2019

Syhunt Community is a web and now mobile application security scanner. Syhunt is able to scan any kind of application...

OpenVAS – Open Vulnerability Assessment System

OpenVAS – Open Vulnerability Assessment System

August 6, 2019August 6, 2019
XSpear: Powerfull XSS Scanning and Parameter Analysis tool

XSpear: Powerfull XSS Scanning and Parameter Analysis tool

July 27, 2019
Striker – Offensive vulnerability scanner

Striker – Offensive vulnerability scanner

July 12, 2019July 11, 2019

Remote Access Trojan

AsyncRAT – Open-Source Remote Administration Tool For Windows

AsyncRAT – Open-Source Remote Administration Tool For Windows

- Remote Administration Tools
August 24, 2019

AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection...

Slackor – A Golang implant that uses Slack as a CC2 Server

Slackor – A Golang implant that uses Slack as a CC2 Server

July 9, 2019
Loki – Remote Access Tool / Botnet

Loki – Remote Access Tool / Botnet

June 17, 2019June 17, 2019
ToRat: Remote Administation Tool using Tor as a Transport Mechanism

ToRat: Remote Administation Tool using Tor as a Transport Mechanism

June 9, 2019

Cryptography

Cryptoforge – Encryption and Privacy Software

Cryptoforge – Encryption and Privacy Software

- Cryptography
July 27, 2019

CryptoForge is a suite of encryption and privacy tools for personal and professional security. It allows you to protect the...

Cryptr – Shell Utility for Encrypting and Decrypting Files using OpenSSL

Cryptr – Shell Utility for Encrypting and Decrypting Files using OpenSSL

July 2, 2019July 27, 2019
GhostSquadHackers – Encrypt/Encode Your Javascript Payloads

GhostSquadHackers – Encrypt/Encode Your Javascript Payloads

June 24, 2019July 27, 2019
CyberChef – A web App For Encryption, Encoding, Compression & Data Analysis

CyberChef – A web App For Encryption, Encoding, Compression & Data Analysis

September 22, 2018July 27, 2019
Crypton – Offensive and Defensive Cryptography

Crypton – Offensive and Defensive Cryptography

September 5, 2018July 27, 2019
hacker gadgets
hacker phone covers

Recent Posts

ElfPack: ELF Binary Section Docking for Stageless Payload Delivery

ElfPack: ELF Binary Section Docking for Stageless Payload Delivery

June 24, 2022
Norimaci - Simple And Lightweight Malware Analysis Sandbox For macOS

Norimaci – Simple And Lightweight Malware Analysis Sandbox For macOS

June 24, 2022
CVE-2022-34305: Apache Tomcat Cross-Site Scripting Vulnerability

CVE-2022-34305: Apache Tomcat Cross-Site Scripting Vulnerability

June 24, 2022
TrelloC2 - Simple C2 Over The Trello API

TrelloC2 – Simple C2 Over The Trello API

June 24, 2022
Elliptic: Illicit Use of Dogecoin Increasing

Elliptic: Illicit Use of Dogecoin Increasing

June 23, 2022
bofhound: offline BloodHound ingestor and LDAP result parser

bofhound: offline BloodHound ingestor and LDAP result parser

June 23, 2022

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs
ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW