Skip to main content

HC WeB : A Browser for HACKERS...

A Browser for HACKERS...

Try for Free...

Gallery:

Online Penetration Testing Tools Index
Information Gathering
Whois
DNS
Location Info
Enumeration and Fingerprint
Data Mining
Search Engines
Editors
Online Text Editors
Share Text Snippets
Network Utilities
Ping
HTTP
HTTPS
VNC
Remote Desktop
SSH
DNS
Sniffers
Misc
Forensics
Frameworks
URL Cloaking
E-mail
Password Cracking
Encoders and Decoders
Encoders
Decoders
Malwares
Malware Analysis
Identify Malicious Websites
Suspected Malicious IPs and URLs
Application Auditing
SQL Injection
Cross Site Scripting
File Inclusion
Anonymity
Proxy
Others

Hackery

Open Penetration Testing Bookmarks Collection
Hacker Media
Blogs, Forums, Magazines and Videos.

Methodologies
Penetration testing frameworks, standards and methodologies.

OSINT

Presentations, People, Organizations and Infrastructure. 

Exploits and Advisories 
Vulnerability and exploit databases.

Cheat Sheets and Syntax
Scripts, Distributions, Tools, Cheat sheets etc..

Distros
Security and Penetration Testing Distributions.

Labs
ISOs, VMs, Vulnerable Applications, Test sites etc..


Exploitation Intro
Exploitation Introductions and guides.

RE and Malware
Reverse Engineering, Malwares etc..

Password and Hashes
Password cracking, databases, default password lists, wordlists, hashes etc..

MitM
All about Man/Monkey in the Middle.

Tools
OSINT, Google Hacking, Web, Social Engineering, Password, Metasploit, NSE, Net scanners, Scripts, Post Exploitation, Netcat, Source Inspection, Firefox Add-ons and Tools listings.

Training/Classes
Security and Hacking trainings, Metasploit, Programming etc..

Web Vectors
SQL injection, upload tricks, File Inclusion, Coldfusion, SharePoint, Lotus, Jboss, VMWare Web, Oracle AppServer and SAP.

Misc/unsorted
Miscallaneous stuffs.

Wireless
Wireless attack resources

CTF/ Wargames
Capture the Flag and Wargames.

Conferences
Security and Hacking Conferences.


Download HC WeB Setup

Comments

Popular posts from this blog

Click-jacking or UI Redressing

Hi! Just want to share my finding, I have found Click-jacking or UI Redressing Vulnerability in   on Google Map , enjoy ;-) This bug was reported to Google Security Team, fixed immediately. About Title:  ClickJacking or UI Redressing on Google Map Business Risk: Normal Discovery Date: October 8, 2013 Author: Jitendra Jaiswal (me) Poc Details   Impact On victim :  1. attacker change victim profile pic by useing his webcam and upload 2. update status acording to attacker Best, Jeet Jaiswal

Evil App Steal Facebook Access Token

Evil App Steal Facebook Access Token  Facebook say about this users Responsible for this its not an issue for facebook so After 3 month i am disclose this may be now they make some change but its still work .......  so users not allow any app to access your data on facebook or dont login anywhere using Facebook may be this an Attacker and After steal your Facebook Access Token he Can Hack your facebook Account  Easily....  [#] Title           :   Evil App Steal Facebook Access Token  [#] Status        :  Unfixed [#] Severity     :  very High [#] Works on  :  Any browser with any version [#] Homepage  :  www.facebook.com [#] Author       :  Jitendra Jaiswal [#] Email          :   jeetjaiswal0@gmail.com This Vulnerability is exploitable to all users who are use facebook apps and allow access of apps an attacker can modify all app setting in url Impact of Vulnerability: An attackers can store  user access token with 2 month no Expires also token not expire if user

Edward Snowden nominated for Nobel Peace Prize 2014

Now there is really great news for all the supporters of Former National Security Agency ( NSA ) contractor Edward Snowden , as he is nominated for the 2014 Nobel Peace Prize by two Norwegian lawmakers. Snorre Valen and Baard Vegar Solhjell , parliamentarians from Norway’s Socialist Left Party said, “ He has contributed to revealing the extreme level of surveillance by nations against other nations and of citizens ,”     Edward Snowden revealed various widely extended NSA spying projects and responsible for handing over the material from one of the world's most secretive organizations the NSA. He faces charges of theft and espionage and is in Russia on temporary asylum. “ Snowden contributed to people knowing about what has happened and spurring public debate ” on trust in government, which he said was “ a fundamental requirement for peace ”. Snorre Valen also added that, “ There’s no doubt that the actions of Edward Snowden may have damaged the securi