Home
Trang Chủ
Đào Tạo
»
CEH v8
Computer Forensic
BackTrack
Metasploit
Web Hacking
Penetration Test
ISO 27001
Online Course
»
Online Anytime
Online Live
eTraining Lab
»
Office
Web Attack
»
HACKADEMIC
»
Level 1
Level 2
Level 3
DVWA TrainingLab
NOWASP TrainingLab
WEB Attacker Lab
Bảo Mật Trang WEB
Pentest
»
Giới Thiệu
Liên Hệ
Hacker Mũ Trắng Việt Nam
Sayfalar
Home
[Auto Rooting v 1.0] Local root [2010 - 2011 - 2012]
9:58 PM
Auto Rooting
,
EN
,
Linux
,
Local root
,
Rooting
Auto Rooting:
2.6.32-46-2011
2.6.37
2.6.33
2.6.18-164-2010
2.6.18-194
2.6.18-6-x86-2011
2.6.18-164
2.6.18-274-2011
2.6.28-2011
etc...
CLICK HERE FOR LOGIN TO ARCHIVE
Download Auto Rooting v 1.0
Email This
BlogThis!
Share to X
Share to Facebook
Share to Pinterest
Newer Post
Older Post
Home
Social Profiles
Popular
Tags
Blog Archives
Tổng số lượt xem trang
Powered by
Blogger
.
Người theo dõi
Translate
Xem Nhiều Nhất
Hexorbase - Multiple Database Management and Audit Tool
HexorBase is a database application designed for administering and auditing multiple database servers simultaneously from a centralized lo...
WiFi software Acrylic WiFi Free v2.1 - WiFi analyzer software and WLAN scanner for network analysts
Acrylic WiFi Professional is the best WiFi analyzer software to identify access points and wifi channels, and to analyze and resolve incide...
Shellter v1.7 - Dynamic ShellCode Injector Tool
Shellter is a dynamic shellcode injection tool, and probably the first dynamic PE infector ever created. It can be used in order to inject s...
[Azazel] Userland Anti-debugging & Anti-detection Rootkit
Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional featur...
[Snort 2.9.5] Network intrusion prevention and detection system (IDS/IPS)
Snort® is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire . Combining the benefits of ...
Thực Hành - Hướng Dẫn Sử Dụng Phần Mềm Tường Lửa Comodo
COMODO Firewall là một phần mềm tường lửa nổi tiếng, đáng tin cậy, miễn phí cho mục đích sử dụng cá nhân. Tường lửa này giúp bảo vệ ...
LINSET - WPA/WPA2 Hack Without Brute Force
How it works Scan the networks. Select network. Capture handshake (can be used without handshake) We choose one of several web interfaces ta...
[Haveged 1.9.1] A simple entropy daemon
The haveged project is an attempt to provide an easy-to-use, unpredictable random number generator based upon an adaptation of the HAVEGE al...
zANTI 2.0 - Android Network Toolkit
zANTI is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. Th...
[Secunia CSI 7.0] Next generation Patch Management Tool
Cybercrime costs organizations millions of dollars and to protect business from the consequences of security breaches, vulnerability intelli...
Labels
An Ninh Vật Lý
An Toàn Thông Tin Trên Mạng Xã Hội
An Toàn Truyền Thông Trên Internet
Anti Hacker
Bảo Vệ Thông Tin Tối Mật
Mật Khẩu Mạnh
Phòng Chống Phần Mềm Độc Hại
Phục Hồi Dữ Liệu Bị Xóa
Social Enginnering
Sử Dụng Điện Thoai Thông Minh An Toàn
Thực Hành
Xóa Thông Tin Bí Mật
Ẩn Danh Trên Mạng Internet
Blog Archive
►
2015
(75)
►
April
(29)
►
February
(15)
►
January
(31)
►
2014
(414)
►
December
(16)
►
November
(17)
►
October
(13)
►
September
(17)
►
August
(27)
►
July
(38)
►
June
(38)
►
May
(27)
►
April
(41)
►
March
(56)
►
February
(52)
►
January
(72)
▼
2013
(383)
►
December
(70)
►
November
(39)
►
October
(33)
►
September
(27)
▼
August
(43)
[CookieCatcher] Session Hijacking Tool
[Resolver v1.0.9] The reverse/bruteforce DNS lookup
[Process Magic v2.0] Command-line Tool to Hide Win...
[Wi-fEye] Automated Network Testing Tool
[Linux Exploit Suggester] Grab the Linux Operating...
[Hidden File Finder v2.5] Tool to Find and Unhide/...
[oclHashcat-plus v0.15] Advanced Password Recovery
[Network Password Decryptor v6.0] Windows Network ...
11 Firefox Add-ons to Hack and PenTest
[GoLismero v2.0] The Web Knife
[Yersinia v0.7.3] The network protocols assessment...
[Router Password Decryptor] Tool to Recover Login/...
[Nmap v6.40] Free Security Scanner For Network Exp...
[Xenotix XSS Exploit Framework v4] Advanced Cross ...
[ZMap v1.0.3] The Internet Scanner
[fuzzdb] Attack and Discovery Pattern Database for...
[The Backdoor Factory] Backdoors win32 PE files
[Malcom] Malware Communication Analyzer
[Vulscan] Module which enhances nmap to a vulnerab...
[LinEnum] Scripted Local Linux Enumeration & Privi...
[I2P] Anonymizing Network
[Tunna Framework] Tool designed to bypass firewall...
[Introspy] Monitor app in your iDevice
[Raft v3.0.1] Response Analysis and Further Testin...
[The Burp SessionAuth] Extension for Detection of ...
[Pyew v2.2] A Python tool for static malware analysis
[IronWASP v0.9.6.5] Open Source Advanced Web Secur...
[Auto Rooting v 1.0] Local root [2010 - 2011 - 2012]
[Arachni v0.4.4] The Web Application Security Scan...
[MISP v2.1] Malware Information Sharing Platform
[Nishang v0.3.0] The PowerShell for Penetration Te...
[WATOBO 0.9.13] THE Web Application Toolbox
[Samurai Web Testing Framework v2.1] Live linux en...
[Zarp v0.1.3] Local Network Attack Tool
[Drozer] The Leading Security Testing Framework fo...
[Browser Password Dump] Tool to instantly recover ...
[RIPS] A static source code analyser for vulnerabi...
[Pytbull] IDS/IPS Testing Framework
[Browser Password Decryptor v5.0] Browser Password...
[THC-Hydra v7.5] Fast network logon cracker
[Twitter Password Decryptor v4.0] Recover Twitter ...
[OWASP Xenotix XSS Exploit Framework v4 2013] Herr...
[Gmail Password Dump] Command-line Tool to Recover...
►
July
(16)
►
June
(18)
►
May
(24)
►
April
(46)
►
March
(30)
►
February
(22)
►
January
(15)
►
2012
(44)
►
December
(14)
►
November
(30)
Blog Archive
►
2015
(75)
►
April
(29)
►
February
(15)
►
January
(31)
►
2014
(414)
►
December
(16)
►
November
(17)
►
October
(13)
►
September
(17)
►
August
(27)
►
July
(38)
►
June
(38)
►
May
(27)
►
April
(41)
►
March
(56)
►
February
(52)
►
January
(72)
▼
2013
(383)
►
December
(70)
►
November
(39)
►
October
(33)
►
September
(27)
▼
August
(43)
[CookieCatcher] Session Hijacking Tool
[Resolver v1.0.9] The reverse/bruteforce DNS lookup
[Process Magic v2.0] Command-line Tool to Hide Win...
[Wi-fEye] Automated Network Testing Tool
[Linux Exploit Suggester] Grab the Linux Operating...
[Hidden File Finder v2.5] Tool to Find and Unhide/...
[oclHashcat-plus v0.15] Advanced Password Recovery
[Network Password Decryptor v6.0] Windows Network ...
11 Firefox Add-ons to Hack and PenTest
[GoLismero v2.0] The Web Knife
[Yersinia v0.7.3] The network protocols assessment...
[Router Password Decryptor] Tool to Recover Login/...
[Nmap v6.40] Free Security Scanner For Network Exp...
[Xenotix XSS Exploit Framework v4] Advanced Cross ...
[ZMap v1.0.3] The Internet Scanner
[fuzzdb] Attack and Discovery Pattern Database for...
[The Backdoor Factory] Backdoors win32 PE files
[Malcom] Malware Communication Analyzer
[Vulscan] Module which enhances nmap to a vulnerab...
[LinEnum] Scripted Local Linux Enumeration & Privi...
[I2P] Anonymizing Network
[Tunna Framework] Tool designed to bypass firewall...
[Introspy] Monitor app in your iDevice
[Raft v3.0.1] Response Analysis and Further Testin...
[The Burp SessionAuth] Extension for Detection of ...
[Pyew v2.2] A Python tool for static malware analysis
[IronWASP v0.9.6.5] Open Source Advanced Web Secur...
[Auto Rooting v 1.0] Local root [2010 - 2011 - 2012]
[Arachni v0.4.4] The Web Application Security Scan...
[MISP v2.1] Malware Information Sharing Platform
[Nishang v0.3.0] The PowerShell for Penetration Te...
[WATOBO 0.9.13] THE Web Application Toolbox
[Samurai Web Testing Framework v2.1] Live linux en...
[Zarp v0.1.3] Local Network Attack Tool
[Drozer] The Leading Security Testing Framework fo...
[Browser Password Dump] Tool to instantly recover ...
[RIPS] A static source code analyser for vulnerabi...
[Pytbull] IDS/IPS Testing Framework
[Browser Password Decryptor v5.0] Browser Password...
[THC-Hydra v7.5] Fast network logon cracker
[Twitter Password Decryptor v4.0] Recover Twitter ...
[OWASP Xenotix XSS Exploit Framework v4 2013] Herr...
[Gmail Password Dump] Command-line Tool to Recover...
►
July
(16)
►
June
(18)
►
May
(24)
►
April
(46)
►
March
(30)
►
February
(22)
►
January
(15)
►
2012
(44)
►
December
(14)
►
November
(30)