- Carnivore - Predator
- Formerly known as THC HackSuite, Carnivore - Predator stands at the forefront of cutting-edge cybersecurity tools, redefining the landscape of penetration testing with unparalleled innovation. Designed to empower ethical hackers, security professionals, and enthusiasts alike, Carnivore - Predator is the ultimate Pentest CMS that puts you in command.
current version: 0.7.0 - PREDATOR
home > documentation > modules
In this article you will learn how to use the CMS in order to create a simple module with very basic functionality.
This article is a follow up to the first article on how to setup a new module. In this article you'll learn about the code in the index.php file and upload an avatar.
Part three on how to setup a new module. In this article you'll learn how to edit the title, version, keywords and other properties for modules.
In part four you will learn how to use screen files and tasks in your modules.
In part five you will learn how to use data files in your modules.
In part five you will learn how to make your modules compatible with ModGlue and create the documentation.
This article explains how to effectively make use of THC AntiEvil.
This article explains how to effectively make use of THC HostFortification.
This article explains how to effectively make use of THC Inject IT.
This article explains how to effectively make use of THC MIMEMagic.
This article explains how to effectively make use of AntiFTP.
This article explains how to effectively make use of THC AntiHash.
This article explains how to effectively make use of AntiLogin.
This article explains how to effectively make use of AntiMail.
This article explains how to effectively make use of AntiZip.
This article explains how to effectively make use of THC Database Brute.
This article explains how to effectively make use of HTTPAuth.
This article explains how to effectively make use of THC xSNMP.
This article explains how to effectively make use of THC xSSH.
This article explains how to effectively make use of CollectPanels.
This article explains how to effectively make use of THC CF Resolver.
This article explains how to effectively make use of xDNS.
This article explains how to effectively make use of THC Dork.
This article explains how to effectively make use of THC Discover.
This article explains how to effectively make use of Enumerate.
This article explains how to effectively make use of THC Investigate.
This article explains how to effectively make use of MisterLG.
This article explains how to effectively make use of Shodown.
This article explains how to effectively make use of THC Sscan.
This article explains how to effectively make use of xWhere.
This article explains how to effectively make use of xScan.
This article explains how to effectively make use of xCrypt.
This article explains how to effectively make use of THC PassGen.
This article explains how to effectively make use of Speedtouch Brute.
This article explains how to effectively make use of THC xMap.
This article explains how to effectively make use of xIF.
This article explains how to effectively make use of xPerformance.
This article explains how to effectively make use of xConverter.
This article explains how to effectively make use of THC xExecute.
This article explains how to effectively make use of xAnalyze.
other categories
Created by Remco Kouw: 2008-2024