• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • 2021
  • October
  • Page 3

Month: October 2021

HTTPUploadExfil – A Simple HTTP Server For Exfiltrating Files/Data During, For Example, CTFs

HTTPUploadExfil – A Simple HTTP Server For Exfiltrating Files/Data During, For Example, CTFs

- Hack Tools
October 29, 2021

HTTPUploadExfil is a (very) simple HTTP server written in Go that’s useful for getting files (and other information) off a…

Hackers are trying to use Windows Subsystem for Linux to attack Windows 10

Hackers are trying to use Windows Subsystem for Linux to attack Windows 10

- News
October 28, 2021

WSL is a Windows Subsystem for Linux provided by Microsoft for Windows 10 and Windows 11. This allows developers to…

DonPAPI – Dumping DPAPI Credz Remotely

DonPAPI – Dumping DPAPI Credz Remotely

- Hack Tools
October 28, 2021

Dumping revelant information on compromised targets without AV detection  DPAPI dumping Lots of credentials are protected by DPAPI. We aim…

6 Ways to Protect Your Business from Cyberattacks

6 Ways to Protect Your Business from Cyberattacks

- News
October 28, 2021

Image Source With the advancement in technology, more and more businesses are working towards making their presence online. While there…

Impacket v0.9.24 releases: collection of Python classes for working with network protocols

Impacket v0.9.24 releases: collection of Python classes for working with network protocols

- Hack Tools
October 28, 2021

What is Impacket? Impacket is a collection of Python classes for working with network protocols. Impacket is focused on providing…

Android banking malware has increased by 159% in T1 2021

Android banking malware has increased by 159% in T1 2021

- News
October 28, 2021

While companies are struggling under continuous ransomware attacks, Android users are increasingly becoming targets of banking malware. According to a…

kestrel-lang v1.1.4 releases: provides an abstraction for threat hunters

kestrel-lang v1.1.4 releases: provides an abstraction for threat hunters

- Hack Tools
October 28, 2021

Kestrel Threat Hunting Language Kestrel threat hunting language provides an abstraction for threat hunters to focus on what to hunt instead of how…

GitHub launches a new policy about hosting malware source code

GitHub launches a new policy about hosting malware source code

- News
October 28, 2021

GitHub recently released its updated community guidelines, explaining how the company will deal with vulnerabilities and malware samples hosted on…

Clash – A Rule-Based Tunnel In Go

Clash – A Rule-Based Tunnel In Go

- Hack Tools
October 28, 2021

Clash A rule-based tunnel in Go. Features Local HTTP/HTTPS/SOCKS server with authentication support VMess, Shadowsocks, Trojan, Snell protocol support for…

In 2031, global losses caused by ransomware will exceed $265 billion

In 2031, global losses caused by ransomware will exceed $265 billion

- News
October 27, 2021

Cybersecurity Ventures predicts that by 2031, ransomware will bring about $265 billion in losses to victims each year; this amount…

Posts navigation

Older posts
Newer posts
hacker gadgets
hacker phone covers

Recent Posts

Jwtear - Modular Command-Line Tool To Parse, Create And Manipulate JWT Tokens For Hackers

Jwtear – Modular Command-Line Tool To Parse, Create And Manipulate JWT Tokens For Hackers

June 29, 2022
Nimc2 - A C2 Fully Written In Nim

Nimc2 – A C2 Fully Written In Nim

June 29, 2022
CURL 7.84 released: tool to transfer data from or to a server

CURL 7.84 released: tool to transfer data from or to a server

June 29, 2022
HintInject: embedding shellcode to Hint/Name Table

HintInject: embedding shellcode to Hint/Name Table

June 28, 2022
secureCodeBox (SCB) - Continuous Secure Delivery Out Of The Box

secureCodeBox (SCB) – Continuous Secure Delivery Out Of The Box

June 28, 2022
Nali: offline tool for querying IP geographic information and CDN provider

Nali: offline tool for querying IP geographic information and CDN provider

June 28, 2022

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs
ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW