byp4xx.sh __ __ __ / /_ __ ______ / // / _ ___ __ / __ / / / / __...
Researchers recently discovered 2 new critical vulnerabilities in the SHAREit App lets attackers bypass the Android device authentication mechanism and download the...
WhatsApp recently introduced the ability for iOS users to access the app via Touch ID or Face ID for added security. Now,...
CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. How...
Author: Colin Harper If you’ve ever dealt in Bitcoin, you may have suffered through hour-long (or at worst, day-long) transaction times. It’s...
Author: Alex Moskov What is Litecoin? Litecoin (LTC) is a decentralized peer-to-peer cryptocurrency that was released on October 7th, 2011 and went...
HatCloud is built in Ruby. It tries to bypass CloudFlare and discover real IP. This can be useful if you need to...
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities,...
WhatWaf is an advanced firewall detection tool who’s goal is to give you the idea of “There’s a WAF?”. WhatWaf works by...
Have you ever heard about trojan droppers ? In short dropper is type of malware that downloads other malwares and Dr0p1t gives...
A new Antivirus design flaw has discovered and named as AVGater for the Windows Local Privilege Escalation Vulnerability which is presented in...
Linux ELF x32 and x64 ASLR bypass exploit with stack-spraying. Properties: ASLR bypass Cross-platform Minimalistic Simplicity Unpatchable Dependencies: Linux 2.6.12+ – will...
A wrapper tool for shadowsocks to consistently bypass firewalls. Quick start Automatically connect The easiest way to run this tool is just...
WAFNinja is a CLI tool written in Python. It is the best tool for penetration testers to bypass a WAF by automating...
Today i’m going to show you guys how to bypass android lockscreen using two methods. Method 1 What you need: Windows or...