🔰5 BEST CHROME EXTENSIONS FOR HACKERS🔰
1. Tamper Data
The Tamper Data extension provides such functionalities. It is an essential tool that supports ethical hacking processes through the Chrome web browser.
2. Hackbar
The HackBar extension assists in hash generation, XSS queries, decoding, encoding, and SQL functions other than an interface. The extension helps users easily copy, read, and request URLs,
3. Open Port Check Tool
The Open Port Check Tool extension helps hackers detect if a computer has any open ports. The extension alerts users to turn off all unused ports to reduce the possibility of an intrusion.
4. Request Maker
Hackers find the Request Maker extension useful when conducting fuzz tests to detect security vulnerabilities and coding errors. The Request Maker tool simplifies the process since it is designed as a core pen-testing tool.
5. Penetration Testing Kit
The Chrome-based Penetration Testing Kit contains a bundle of useful pen testing exercises for professional, ethical hackers. The extension provides an interface through which users can view and send responses and request information.
📤 Uploaded By 𝐓𝐌𝐑•𝐅𝐈𝐋𝐄𝐒
1. Tamper Data
The Tamper Data extension provides such functionalities. It is an essential tool that supports ethical hacking processes through the Chrome web browser.
2. Hackbar
The HackBar extension assists in hash generation, XSS queries, decoding, encoding, and SQL functions other than an interface. The extension helps users easily copy, read, and request URLs,
3. Open Port Check Tool
The Open Port Check Tool extension helps hackers detect if a computer has any open ports. The extension alerts users to turn off all unused ports to reduce the possibility of an intrusion.
4. Request Maker
Hackers find the Request Maker extension useful when conducting fuzz tests to detect security vulnerabilities and coding errors. The Request Maker tool simplifies the process since it is designed as a core pen-testing tool.
5. Penetration Testing Kit
The Chrome-based Penetration Testing Kit contains a bundle of useful pen testing exercises for professional, ethical hackers. The extension provides an interface through which users can view and send responses and request information.
📤 Uploaded By 𝐓𝐌𝐑•𝐅𝐈𝐋𝐄𝐒
Forwarded from Technical Hackers
♨️ WEB APPLICATION PENTESTETING ON MOBILE:
1) DH Hackbar
Used for injecting payloads and many more
Download:https://github.com/darknethaxor/DH-HackBar/releases/download/v1.1/Latest.apk
2) Mini burp : Httpcanry
Similar like burpsuite to intercept request
DOWNLOAD: https://m.apkpure.com/httpcanary-%E2%80%94-http-sniffer-capture-analysis/com.guoshi.httpcanary/download?from=amp_detail
3) ENABLE DEVLOPER TOOLS IN BROWSER (FIREFOX)
SAVE THIS CODE AT BOOKMARK IN URL SECTION >> CLICK ON BOOKMARK WHENEVER U NEED TO INSPECT IN SITE
4) Terminal : run CLI TOOLS
I never preferred to use termux
EITHER DOWNLOAD NETHUNTER WITH ROOT
or setup a vps and use it in SSH:22
Now start hacking from your phone.
Enjoy!!🔥
1) DH Hackbar
Used for injecting payloads and many more
Download:https://github.com/darknethaxor/DH-HackBar/releases/download/v1.1/Latest.apk
2) Mini burp : Httpcanry
Similar like burpsuite to intercept request
DOWNLOAD: https://m.apkpure.com/httpcanary-%E2%80%94-http-sniffer-capture-analysis/com.guoshi.httpcanary/download?from=amp_detail
3) ENABLE DEVLOPER TOOLS IN BROWSER (FIREFOX)
javascript:(function () {var script=document.createElement('script');script.src="//cdn.jsdelivr.net/npm/eruda";document.body.appendChild(script); script.onload = function () { eruda.init() } })();SAVE THIS CODE AT BOOKMARK IN URL SECTION >> CLICK ON BOOKMARK WHENEVER U NEED TO INSPECT IN SITE
4) Terminal : run CLI TOOLS
I never preferred to use termux
EITHER DOWNLOAD NETHUNTER WITH ROOT
or setup a vps and use it in SSH:22
Now start hacking from your phone.
Enjoy!!🔥
⭕️ Cross-Site Request Forgery
Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated.
▪️Methods to bypass CSRF protection
https://teletype.in/@sudhanshuss/6D7BuMjA745
Share and support us❣
📤 Uploaded By 𝐓𝐌𝐑•𝐅𝐈𝐋𝐄𝐒
Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated.
▪️Methods to bypass CSRF protection
https://teletype.in/@sudhanshuss/6D7BuMjA745
Share and support us❣
📤 Uploaded By 𝐓𝐌𝐑•𝐅𝐈𝐋𝐄𝐒