Skip to main content

HC WeB : A Browser for HACKERS...

A Browser for HACKERS...

Try for Free...

Gallery:

Online Penetration Testing Tools Index
Information Gathering
Whois
DNS
Location Info
Enumeration and Fingerprint
Data Mining
Search Engines
Editors
Online Text Editors
Share Text Snippets
Network Utilities
Ping
HTTP
HTTPS
VNC
Remote Desktop
SSH
DNS
Sniffers
Misc
Forensics
Frameworks
URL Cloaking
E-mail
Password Cracking
Encoders and Decoders
Encoders
Decoders
Malwares
Malware Analysis
Identify Malicious Websites
Suspected Malicious IPs and URLs
Application Auditing
SQL Injection
Cross Site Scripting
File Inclusion
Anonymity
Proxy
Others

Hackery

Open Penetration Testing Bookmarks Collection
Hacker Media
Blogs, Forums, Magazines and Videos.

Methodologies
Penetration testing frameworks, standards and methodologies.

OSINT

Presentations, People, Organizations and Infrastructure. 

Exploits and Advisories 
Vulnerability and exploit databases.

Cheat Sheets and Syntax
Scripts, Distributions, Tools, Cheat sheets etc..

Distros
Security and Penetration Testing Distributions.

Labs
ISOs, VMs, Vulnerable Applications, Test sites etc..


Exploitation Intro
Exploitation Introductions and guides.

RE and Malware
Reverse Engineering, Malwares etc..

Password and Hashes
Password cracking, databases, default password lists, wordlists, hashes etc..

MitM
All about Man/Monkey in the Middle.

Tools
OSINT, Google Hacking, Web, Social Engineering, Password, Metasploit, NSE, Net scanners, Scripts, Post Exploitation, Netcat, Source Inspection, Firefox Add-ons and Tools listings.

Training/Classes
Security and Hacking trainings, Metasploit, Programming etc..

Web Vectors
SQL injection, upload tricks, File Inclusion, Coldfusion, SharePoint, Lotus, Jboss, VMWare Web, Oracle AppServer and SAP.

Misc/unsorted
Miscallaneous stuffs.

Wireless
Wireless attack resources

CTF/ Wargames
Capture the Flag and Wargames.

Conferences
Security and Hacking Conferences.


Download HC WeB Setup

Comments

Popular posts from this blog

Facebook Web Security Bug Bounty: Directory Traversal Vulnerability / RCE In Parse.com

http://parse.com   directory traversal vulnerability Little Insight: http://parse.com  was vulnerable to a directory traversal / RCE vulnerability. As a result, it was possible for an attacker to load web server-readable files from the local filesystem. or Run commend on That Well this is my 4th reward form facebook  Directory Traversal or RCE Vulnerability  That  give me 5th position in Facebook white-hat Page Report Date :23  July 2014 Reward For Directory Traversal or RCE Vulnerability :  20000$ How This work......? As we discussed earlier on my old post  Flowdock Directory Traversal Vulnerability exposed files outside of Rails’ view paths. '%5C' turns into '\' after decoding. Using Rack::Protection    it only rejects '/../' segments in the request path.   patch apply for Rack::Protection acording CVE-2014-0130  and  also Reject now '%5C' turns into '\' af...

Confirmed: Angry Birds website hacked by Anti-NSA Hacker

Syrian Electronic Army yesterday posted a tweet saying that one of its friend with handle "Anti-NSA" hacker defaced the Angry website. At the time, we were not able to confirm the defacement.  No one was reported to have seen the hack.  Even the Zone-h mirror didn't confirm the defacement, displayed a message "The mirror is onhold and has not been verified yet". So, we didn't have strong proof to report the hack.  Today,  Rovio, creator of angry birds, confirmed that the defacement was there for few minutes and corrected immediately.  Now, the Zone-h record also confirmed it. Antti Tikkanen, Director of Security Response at F-Secure Labs, said in twitter that the attack is actually 'DNS Hijack attack'. He mentioned that the website itself not touched by the hacker; hacker managed to modify the DNS records. He also said that the angrybirds website pointed to some IP address(31.170.165.141) assoicated with Lithuania for at least one hour.  The same ...