• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
Cortex-XDR-Config-Extractor – Cortex XDR Config Extractor

Cortex-XDR-Config-Extractor – Cortex XDR Config Extractor

March 20, 2023
NimPlant – A Light-Weight First-Stage C2 Implant Written In Nim

NimPlant – A Light-Weight First-Stage C2 Implant Written In Nim

March 20, 2023
X-force – IBM Security Utilitary Library In Python. Search And Query All Sources: Threat_Activities And Groups, Malware_Analysis, Industries

X-force – IBM Security Utilitary Library In Python. Search And Query All Sources: Threat_Activities And Groups, Malware_Analysis, Industries

March 20, 2023
Thunderstorm – Modular Framework To Exploit UPS Devices

Thunderstorm – Modular Framework To Exploit UPS Devices

March 20, 2023
Samsung to improve the durability of the waterdrop hinges in the foldable smartphones

Samsung to improve the durability of the waterdrop hinges in the foldable smartphones

Google releases Chrome version 111 to fix 40 security vulnerabilities
Google releases Chrome version 111 to fix 40 security vulnerabilities
Intel product roadmap leaked: Raptor Lake Refresh will be launched in Q3 next year
Intel product roadmap leaked: Raptor Lake Refresh will be launched in Q3 next year
gifts for hackers

Hacking News

Samsung to improve the durability of the waterdrop hinges in the foldable smartphones

Samsung to improve the durability of the waterdrop hinges in the foldable smartphones

- News
March 17, 2023

With more and more Chinese brand operators adopting a simplified hinge design on their foldable screens, greatly reducing the weight...

Google releases Chrome version 111 to fix 40 security vulnerabilities

Google releases Chrome version 111 to fix 40 security vulnerabilities

March 17, 2023
Intel product roadmap leaked: Raptor Lake Refresh will be launched in Q3 next year

Intel product roadmap leaked: Raptor Lake Refresh will be launched in Q3 next year

December 9, 2022
Google Patches Actively Exploited Chrome Zero-Day CVE-2022-4135 Vulnerability

Google Patches Actively Exploited Chrome Zero-Day CVE-2022-4135 Vulnerability

November 25, 2022
Lenovo BIOS firmware has multiple security flaws

Lenovo BIOS firmware has multiple security flaws

November 14, 2022
pentesting gear

Hack Tools

Cortex-XDR-Config-Extractor – Cortex XDR Config Extractor

Cortex-XDR-Config-Extractor – Cortex XDR Config Extractor

- Hack Tools
March 20, 2023

This tool is meant to be used during Red Team Assessments and to audit the XDR Settings. With this tool...

NimPlant – A Light-Weight First-Stage C2 Implant Written In Nim

NimPlant – A Light-Weight First-Stage C2 Implant Written In Nim

March 20, 2023
X-force – IBM Security Utilitary Library In Python. Search And Query All Sources: Threat_Activities And Groups, Malware_Analysis, Industries

X-force – IBM Security Utilitary Library In Python. Search And Query All Sources: Threat_Activities And Groups, Malware_Analysis, Industries

March 20, 2023
Thunderstorm – Modular Framework To Exploit UPS Devices

Thunderstorm – Modular Framework To Exploit UPS Devices

March 20, 2023

Operating Systems

BlackArch Linux v2019.09.01 – Penetration Testing Distribution

BlackArch Linux v2019.09.01 – Penetration Testing Distribution

- Operating Systems
September 9, 2019

BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers. The repository contains 2336 tools. You can...

Commando VM v2.0 – The First Full Windows-based Penetration Testing OS

Commando VM v2.0 – The First Full Windows-based Penetration Testing OS

August 9, 2019
OPS City – Build and Run Nanos Unikernels

OPS City – Build and Run Nanos Unikernels

July 9, 2019
Whonix 15 Released – Based on Debian Buster Distribution

Whonix 15 Released – Based on Debian Buster Distribution

July 3, 2019
hacker swag

Mobile Hacking

Andrill – Vulnerable Mobile Application with Various Levels

Andrill – Vulnerable Mobile Application with Various Levels

- Mobile Hacking
August 2, 2019

Andrill is an android mobile application interacting with a back-end API that is vulnerable with various levels of difficulty. It...

Yaazhini – Free Android APK & API Vulnerability Scanner

Yaazhini – Free Android APK & API Vulnerability Scanner

June 12, 2019
ANDRAX v3 – The First And Unique Penetration Testing Platform For Android Smartphones

ANDRAX v3 – The First And Unique Penetration Testing Platform For Android Smartphones

June 12, 2019June 12, 2019
PhoneSploit – Using Open Adb Ports We Can Exploit A Devive

PhoneSploit – Using Open Adb Ports We Can Exploit A Devive

May 31, 2019July 27, 2019
Top 5 Best Android Game Hacking Apps

Top 5 Best Android Game Hacking Apps

May 9, 2019May 19, 2019

Bruteforce

Brute_Force – BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix

Brute_Force – BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix

- Bruteforcing
July 21, 2019

A tool to Brute force social media, email and streaming accounts.Install Brute_forcepip install proxylist pip install mechanizegit clone https://github.com/Matrix07ksa/Brute_Force Usage: BruteForce Gmail...

Patator – Multi-Purpose Brute-Forcer with a Modular Design and a Flexible Usage

Patator – Multi-Purpose Brute-Forcer with a Modular Design and a Flexible Usage

June 30, 2019
GoBuster v3.0 –  Directory/File, DNS and VHost busting tool written in Go

GoBuster v3.0 – Directory/File, DNS and VHost busting tool written in Go

June 20, 2019
HashCK – Automated Hashcracking Tool

HashCK – Automated Hashcracking Tool

June 17, 2019

Hardware & Embedded

HAL – The Hardware Analyzer

HAL – The Hardware Analyzer

- Hardware & Embedded
June 29, 2019

HAL is a comprehensive reverse engineering and manipulation framework for gate-level netlists focusing on efficiency, extendability and portability. HAL comes...

PRET – Hacking Printer Command Languages

PRET – Hacking Printer Command Languages

May 8, 2019July 27, 2019
Bash Bunny – Multi-Functional USB Attack Device

Bash Bunny – Multi-Functional USB Attack Device

April 24, 2019
Killcast – Manipulate Chromecast Devices in your Network

Killcast – Manipulate Chromecast Devices in your Network

January 16, 2019July 27, 2019

Vulnerability Scanners

Syhunt Community 6.7 – Web And Mobile Application Scanner

Syhunt Community 6.7 – Web And Mobile Application Scanner

- Vulnerability Scanners
October 1, 2019

Syhunt Community is a web and now mobile application security scanner. Syhunt is able to scan any kind of application...

OpenVAS – Open Vulnerability Assessment System

OpenVAS – Open Vulnerability Assessment System

August 6, 2019August 6, 2019
XSpear: Powerfull XSS Scanning and Parameter Analysis tool

XSpear: Powerfull XSS Scanning and Parameter Analysis tool

July 27, 2019
Striker – Offensive vulnerability scanner

Striker – Offensive vulnerability scanner

July 12, 2019July 11, 2019

Remote Access Trojan

AsyncRAT – Open-Source Remote Administration Tool For Windows

AsyncRAT – Open-Source Remote Administration Tool For Windows

- Remote Administration Tools
August 24, 2019

AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection...

Slackor – A Golang implant that uses Slack as a CC2 Server

Slackor – A Golang implant that uses Slack as a CC2 Server

July 9, 2019
Loki – Remote Access Tool / Botnet

Loki – Remote Access Tool / Botnet

June 17, 2019June 17, 2019
ToRat: Remote Administation Tool using Tor as a Transport Mechanism

ToRat: Remote Administation Tool using Tor as a Transport Mechanism

June 9, 2019

Cryptography

Cryptoforge – Encryption and Privacy Software

Cryptoforge – Encryption and Privacy Software

- Cryptography
July 27, 2019

CryptoForge is a suite of encryption and privacy tools for personal and professional security. It allows you to protect the...

Cryptr – Shell Utility for Encrypting and Decrypting Files using OpenSSL

Cryptr – Shell Utility for Encrypting and Decrypting Files using OpenSSL

July 2, 2019July 27, 2019
GhostSquadHackers – Encrypt/Encode Your Javascript Payloads

GhostSquadHackers – Encrypt/Encode Your Javascript Payloads

June 24, 2019July 27, 2019
CyberChef – A web App For Encryption, Encoding, Compression & Data Analysis

CyberChef – A web App For Encryption, Encoding, Compression & Data Analysis

September 22, 2018July 27, 2019
Crypton – Offensive and Defensive Cryptography

Crypton – Offensive and Defensive Cryptography

September 5, 2018July 27, 2019
hacker gadgets
hacker phone covers

Recent Posts

Cortex-XDR-Config-Extractor - Cortex XDR Config Extractor

Cortex-XDR-Config-Extractor – Cortex XDR Config Extractor

March 20, 2023
NimPlant - A Light-Weight First-Stage C2 Implant Written In Nim

NimPlant – A Light-Weight First-Stage C2 Implant Written In Nim

March 20, 2023
X-force - IBM Security Utilitary Library In Python. Search And Query All Sources: Threat_Activities And Groups, Malware_Analysis, Industries

X-force – IBM Security Utilitary Library In Python. Search And Query All Sources: Threat_Activities And Groups, Malware_Analysis, Industries

March 20, 2023
Thunderstorm - Modular Framework To Exploit UPS Devices

Thunderstorm – Modular Framework To Exploit UPS Devices

March 20, 2023
DataSurgeon - Quickly Extracts IP's, Email Addresses, Hashes, Files, Credit Cards, Social Secuirty Numbers And More From Text

DataSurgeon – Quickly Extracts IP’s, Email Addresses, Hashes, Files, Credit Cards, Social Secuirty Numbers And More From Text

March 19, 2023
FindUncommonShares - A Python Equivalent Of PowerView's Invoke-ShareFinder.ps1 Allowing To Quickly Find Uncommon Shares In Vast Windows Domains

FindUncommonShares – A Python Equivalent Of PowerView’s Invoke-ShareFinder.ps1 Allowing To Quickly Find Uncommon Shares In Vast Windows Domains

March 19, 2023

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs

About Us

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Join Our Community!

Please wait...
Get the latest News and Hacking Tools delivered to your inbox.
Don't Worry ! You will not be spammed

Active Members

Submit a Tool

Hackers Handbook 2018


Grab your copy here

ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW