This page will contain all the links to the script and exploits built from scratch in python as well as c code.

</table>
| SECURING SYSTEM |
|---|
| 1. Sign & Verify message |
| 2. SandBox Detection |
| 3. TCP Proxy |
| STEALING AND SNIFFING ATTACKS |
|---|
| 1. Stealing saved wifi password from windows |
| 2. Sniffing packets |
| 3. Email Credential sniffers |
| Bluetooth Attacks |
|---|
| 1. Bluetooth discovery |
| 2. Bluetooth SDP browsing |
| 3. Bluetooth OBEX |
| 4. Bluetooth RCOMM channel scanner |
| 5. Blue Bug Exploit |
| 6. Blue Snarf Exploit |
| 7. Bluetooth spoofing |
| 8. Bluetooth sniffing |
| KALI LINUX HACKING COMMANDS CHEATSHEET |
|---|
| 1. Hacking commands with Kali Linux |
| TROJAN AND BACKDOORS |
|---|
| 1. Command and Control Trojan |
| 2. Reverse shell in python |
| 3. Keylogger |
| 4. Screenshot with Python |
| 5. Backdoor with Python |
| DICTIONARY AND BURTEFORCING ATTACKS |
|---|
| 1. Dictionary Attack |
| MAN IN THE MIDDLE ATTACKS |
|---|
| 1. Man in Browser Attack |