Anonymously Hiding Tools

CSRF Attack

DNS Resolution

DoS & DDoS Attacks

File Upload Vulnerabilities

Google Dorks

Information Gathering

Phishing Attack Tools

Remote Code Execution (RCE)

SQL Injections

Wireless Attack Tools

XSS Attacks