-
Singhi & Co
- Kolkata
-
01:39
(UTC +05:30) - https://hackwithsumit.github.io/
- https://t.me/hackwithsumit01
- hackwithsumit
- hackwithsumit
- @HackWithSumit-Repacked
Highlights
-
KaliNethunter-Rootless Public
NetHunter Rootless Edition. Maximum flexibility with no commitment. Install Kali NetHunter on any stock, unrooted Android device without voiding the warranty.
-
Flipper-Zero Public
The Flipper Zero is a portable multi-functional device developed for interaction with access control systems.
Apache License 2.0 UpdatedNov 4, 2024 -
Windows-10-11-No-Disks Public
How to Fix "No Drives Detected" During Windows Installation
Apache License 2.0 UpdatedOct 15, 2024 -
KaliNethunter-Rooted Public
The Kali NetHunter project is the first Open-source Android penetration testing platform for Android devices, allowing for access to the Kali toolset from various supported Android devices. There aβ¦
-
BurpSuite-Walkthrough Public
Burp Suite walkthrough typically refers to a step-by-step guide on how to use Burp Suite, a popular tool for web application security testing.
-
BurpSuiteProfessional-2023 Public
Burp or Burp Suite is a set of tools used for penetration testing of web applications. It is developed by the company named Portswigger.
-
Folder-SubFolder- Public
Create Folder Subfolder using a Batch file with single click
Batchfile MIT License UpdatedMay 30, 2024 -
Process of Audit Trail Tally Prime EditLog
MIT License UpdatedMay 7, 2024 -
Web Application vulnerabilities are flaws or weaknesses in an application that can lead to exploitation or a security breach.
-
ExcelCellFinder-Python Public
This application helps to find out specific Excel Cell
Jupyter Notebook MIT License UpdatedApr 16, 2024 -
-
A cybersecurity audit involves a comprehensive analysis and review of your IT infrastructure. It detects vulnerabilities and threats, displaying weak links and high-risk practices.
-
TextMessage-Forward Public
π² Forward text messages from/to your Android phone.
-
IMSI-Catcher Public
This program show you IMSI numbers of cellphones around you.
-
AndroidPentesting Public
Android pentesting is the process of evaluating the security of an Android application by identifying its vulnerabilities and weaknesses. It involves analyzing the application's source code, binaryβ¦
-
how to Config BurpSuite With AndroidEmulator for android pentesting
-
KaliNethunter-BashSource Public
Customize Kali Nethunter Your own style.
-
-
Hyundai-i20-Dashboard-error Public
Troubleshoot Hyundai i20
-
RenGine Public
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous β¦
MIT License UpdatedDec 6, 2023 -
WindowsMACspoofer Public
MAC Spoofing is a type of attack used to exploit flaws in the authentication mechanism implemented by wired and wireless networking hardware
-
DisposableTemp-Mail Public
Disposable email addressing, also known as DEA or dark mail or "masked" email, refers to an approach which involves a unique email address being used for every contact, entity, or for a limited numβ¦
-
CertifiedEthicalHacker-v12 Public template
CEH V12 Training Kit (20 Modules)
-
MobileAudit-SAST-Android Public
Django application that performs SAST and Malware Analysis for Android APKs
MIT License UpdatedNov 27, 2023 -
Ethical hacking involves the authorized attempt to gain access to computer systems, applications or data by duplicating the strategies and methods that would be used by a malicious hacker.
-
-
Apk2URL Public
A tool to quickly extract IP and URL endpoints from APKs by disassembling and decompiling
-
Android-CameraHack Public
This tool helps you to hack android device front camera
-
Tor-Proxychains Public
proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5, or HTTP(S) proxy.
-
Android Penetration Testing. We check how a mobile app protects itself, stores secrets, which libraries it employs. We look for gaps in business logic that introduce a risk for your security. We heβ¦