• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • Hack Tools
  • Privilege Escalation

Category: Privilege Escalation

TikiTorch – Process Injection Tool

TikiTorch – Process Injection Tool

- Privilege Escalation
October 28, 2019

TikiTorch was named in homage to CACTUSTORCH by Vincent Yiu. The basic concept of CACTUSTORCH is that it spawns a…

Postenum – Basic/Advanced Privilege Escalation Techniques

Postenum – Basic/Advanced Privilege Escalation Techniques

- Privilege Escalation
July 28, 2019

Postenum is a clean, nice and easy tool for basic/advanced privilege escalation techniques.

TROMMEL – Search Files For Potential Vulnerable Indicators

TROMMEL – Search Files For Potential Vulnerable Indicators

- Privilege Escalation, Vulnerability Scanners
July 1, 2019July 27, 2019

TROMMEL sifts through embedded device files to identify potential vulnerable indicators. The tool can be used to search files and…

PivotSuite – A Network Pivoting Toolkit

PivotSuite – A Network Pivoting Toolkit

- Hack Tools, Privilege Escalation
June 28, 2019July 27, 2019

PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use…

mXtract – Offensive Memory Extractor & Analyzer

mXtract – Offensive Memory Extractor & Analyzer

- Hack Tools, Privilege Escalation
April 24, 2019July 27, 2019

mXtract is an opensource linux based tool that analyzes and dumps memory. It is developed as an offensive pentration testing…

UACME v3.1.5 releases: Defeating Windows User Account Control

UACME v3.1.5 releases: Defeating Windows User Account Control

- Hack Tools, Privilege Escalation
February 17, 2019July 27, 2019

Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor.

Scavenger – A Post-Exploitation Scanning/Mapping Tool

Scavenger – A Post-Exploitation Scanning/Mapping Tool

- Hack Tools, Privilege Escalation
December 15, 2018July 27, 2019

SCAVENGER is a multi-threaded post-exploitation scanning tool for mapping systems and finding “interesting” and most frequently used files, folders and…

PacketWhisper Exfiltration Toolset

PacketWhisper Exfiltration Toolset

- Hack Tools, Privilege Escalation, Steganography
September 11, 2018July 27, 2019

PacketWhisper – Stealthily Transfer Data & Defeat Attribution Using DNS Queries & Text-Based Steganography, without the need for attacker-controlled Name…

Rootstealer – Trick To Inject Commands On Root Terminal

Rootstealer – Trick To Inject Commands On Root Terminal

- Hack Tools, Privilege Escalation
August 22, 2018July 27, 2019

Rootstealer is an example of new attack using X11. This tool is used to detect when linux users open terminal…

Win-PortFwd – Windows Port forwarding using native netsh client

Win-PortFwd – Windows Port forwarding using native netsh client

- Firewall, Hack Tools, Privilege Escalation
August 11, 2018July 27, 2019

Powershell script to setup windows port forwarding using native netsh client

Posts navigation

Older posts
hacker gadgets
hacker phone covers

Recent Posts

Shelltropy: hiding malicious shellcode via Shannon encoding

Shelltropy: hiding malicious shellcode via Shannon encoding

June 29, 2022
Third and Final “EastSideHigh” Defendant Pleads Guilty

Third and Final “EastSideHigh” Defendant Pleads Guilty

June 29, 2022
Jwtear - Modular Command-Line Tool To Parse, Create And Manipulate JWT Tokens For Hackers

Jwtear – Modular Command-Line Tool To Parse, Create And Manipulate JWT Tokens For Hackers

June 29, 2022
Nimc2 - A C2 Fully Written In Nim

Nimc2 – A C2 Fully Written In Nim

June 29, 2022
CURL 7.84 released: tool to transfer data from or to a server

CURL 7.84 released: tool to transfer data from or to a server

June 29, 2022
HintInject: embedding shellcode to Hint/Name Table

HintInject: embedding shellcode to Hint/Name Table

June 28, 2022

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs
ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW