• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • Hack Tools
  • Privilege Escalation

Category: Privilege Escalation

TikiTorch – Process Injection Tool

TikiTorch – Process Injection Tool

- Privilege Escalation
October 28, 2019

TikiTorch was named in homage to CACTUSTORCH by Vincent Yiu. The basic concept of CACTUSTORCH is that it spawns a…

Postenum – Basic/Advanced Privilege Escalation Techniques

Postenum – Basic/Advanced Privilege Escalation Techniques

- Privilege Escalation
July 28, 2019

Postenum is a clean, nice and easy tool for basic/advanced privilege escalation techniques.

TROMMEL – Search Files For Potential Vulnerable Indicators

TROMMEL – Search Files For Potential Vulnerable Indicators

- Privilege Escalation, Vulnerability Scanners
July 1, 2019July 27, 2019

TROMMEL sifts through embedded device files to identify potential vulnerable indicators. The tool can be used to search files and…

PivotSuite – A Network Pivoting Toolkit

PivotSuite – A Network Pivoting Toolkit

- Hack Tools, Privilege Escalation
June 28, 2019July 27, 2019

PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use…

mXtract – Offensive Memory Extractor & Analyzer

mXtract – Offensive Memory Extractor & Analyzer

- Hack Tools, Privilege Escalation
April 24, 2019July 27, 2019

mXtract is an opensource linux based tool that analyzes and dumps memory. It is developed as an offensive pentration testing…

UACME v3.1.5 releases: Defeating Windows User Account Control

UACME v3.1.5 releases: Defeating Windows User Account Control

- Hack Tools, Privilege Escalation
February 17, 2019July 27, 2019

Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor.

Scavenger – A Post-Exploitation Scanning/Mapping Tool

Scavenger – A Post-Exploitation Scanning/Mapping Tool

- Hack Tools, Privilege Escalation
December 15, 2018July 27, 2019

SCAVENGER is a multi-threaded post-exploitation scanning tool for mapping systems and finding “interesting” and most frequently used files, folders and…

PacketWhisper Exfiltration Toolset

PacketWhisper Exfiltration Toolset

- Hack Tools, Privilege Escalation, Steganography
September 11, 2018July 27, 2019

PacketWhisper – Stealthily Transfer Data & Defeat Attribution Using DNS Queries & Text-Based Steganography, without the need for attacker-controlled Name…

Rootstealer – Trick To Inject Commands On Root Terminal

Rootstealer – Trick To Inject Commands On Root Terminal

- Hack Tools, Privilege Escalation
August 22, 2018July 27, 2019

Rootstealer is an example of new attack using X11. This tool is used to detect when linux users open terminal…

Win-PortFwd – Windows Port forwarding using native netsh client

Win-PortFwd – Windows Port forwarding using native netsh client

- Firewall, Hack Tools, Privilege Escalation
August 11, 2018July 27, 2019

Powershell script to setup windows port forwarding using native netsh client

Posts navigation

Older posts
hacker gadgets
hacker phone covers

Recent Posts

Samba Issues Security Updates to Patch Three Vulnerabilities

Samba Issues Security Updates to Patch Three Vulnerabilities

March 31, 2023
New APT Exploits Zimbra Vulnerability to Target European Military and Diplomatic Entities

New APT Exploits Zimbra Vulnerability to Target European Military and Diplomatic Entities

March 30, 2023
MSI Dump - A Tool That Analyzes Malicious MSI Installation Packages, Extracts Files, Streams, Binary Data And Incorporates YARA Scanner

MSI Dump – A Tool That Analyzes Malicious MSI Installation Packages, Extracts Files, Streams, Binary Data And Incorporates YARA Scanner

March 30, 2023
aerleon: Generate firewall configs for multiple firewall platforms

aerleon: Generate firewall configs for multiple firewall platforms

March 30, 2023
hashtopolis v0.13.1 released: A Hashcat wrapper for distributed hashcracking

hashtopolis v0.13.1 released: A Hashcat wrapper for distributed hashcracking

March 30, 2023
Artemis: modular web reconnaissance tool and vulnerability scanner

Artemis: modular web reconnaissance tool and vulnerability scanner

March 29, 2023

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs

About Us

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Join Our Community!

Please wait...
Get the latest News and Hacking Tools delivered to your inbox.
Don't Worry ! You will not be spammed

Active Members

Submit a Tool

Hackers Handbook 2018


Grab your copy here

ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW