Tag - Cyb3rw0rM

20 Popular Wireless Hacking Tools 20 Popular Wireless Hacking Tools 1. Aircrack 2. AirSnort 3. Kismet 4. Cain & Able 5. WireShark 6. Fern WiFi Wireless Cracker 7. CoWPAtty 8. Airjack 9. WepAttack 10. NetStumbler 11. inSSIDer 12. Wifiphisher 13. KisMac 14. Reaver 15. Wifite 16. WepDecrypt 17. OmniPeek 18. CloudCracker 19. CommonView for Wi-Fi 20. Pyrit

By Cyb3rw0rM - October, 9th 2016 20 Popular Wireless Hacking Tools Last year, I wrote an article covering popular wireless hacking tools to crack or recover password of wireless network. We added 13 tools in that article which were popular and work g...

5000 Fresh Google Dorks List For SQL Injection 2016

By Cyb3rw0rM - May, 12th 2016 SQLi Dork list: trainers.php?id= article.php?ID= play_old.php?id= declaration_more.php?decl_id= Pageid= games.php?id= newsDetail.php?id= staff_id= historialeer.php?num= product-item.php?id= news_view.php?id= humor.php?id...

7 Hidden Tricks Of Android Smartphone You Probably Didnt Know!

By Cyb3rw0rM - June, 27th 2016 7 things you are not aware that your Android smartphone can do While many people have Android smartphones, but not many users are aware how powerful their devices can be. In this article, we present you a few hacks to m...

ARPwner – ARP & DNS Poisoning Attack Tool

By Cyb3rw0rM - June, 3rd 2016 ARPwner is a tool to do ARP poisoning and DNS poisoning attacks, with a simple GUI and a plugin system to do filtering of the information gathered, also has a implementation of sslstrip and is coded 100% in python and on...

BBQSQL – Blind SQL Injection Framework

By Cyb3rw0rM - September, 17th 2016 BBQSQL is a blind SQL injection framework written in Python. It is extremely useful when attacking tricky SQL injection vulnerabilities. BBQSQL is also a semi-automatic tool, allowing quite a bit of customization f...

Bearded – Security Automation Platform

By Cyb3rw0rM - September, 17th 2016 Bearded is an open source Security Automation platform. The platform allows Development, QA, and Security team members to perform automated web security scans with a set of tools, and re-execute those scans as need...

BetterCap – Modular, Portable MiTM Framework

By Cyb3rw0rM - April, 30th 2016 BetterCAP is a powerful, modular, portable MiTM framework that allows you to perform various types of Man-In-The-Middle attacks against the network. It can also help to manipulate HTTP and HTTPS traffic in real-time an...

Blackhash – Audit Passwords Without Hashes

By Cyb3rw0rM - June, 3rd 2016 A traditional password audit typically involves extracting password hashes from systems and then sending those hashes to a third-party security auditor or an in-house security team. These security specialists have the kn...

BlueScan – A Bluetooth Device Scanner

By Cyb3rw0rM - May, 21st 2016 BlueScan is a BASH script that acts as a Bluetooth device scanner. It’s a tool designed to detect Bluetooth devices within the radio range of your system and extract as much information as possible from the devices witho...

Bountiful! Yahoo! Plugs! Mail! Spoofing! Bug!

By Cyb3rw0rM - October, 3rd 2016 Yahoo! has plugged a sender spoofing bug in its mail service turned up by independent researcher Lawrence Amer. The medium-rated bug in the compose message module allowed attackers to spoof Yahoo! e-mail sender names...