PhpSploit – post exploitation framework
It is a post-exploitation tool capable to maintain access to a compromised web server for privilege escalation purposes. The obfuscated
Learn ethical hacking , cyber security, computer programming, networking, android tricks and windows tricks.
It is a post-exploitation tool capable to maintain access to a compromised web server for privilege escalation purposes. The obfuscated
There is no excerpt because this is a protected post.
There is no excerpt because this is a protected post.
Most of web administrators that doesn’t care properly about the security of the servers, are often target of attacks that
HULK is a Denial of Service (DoS) tool used to attack web servers by generating unique and obfuscated traffic volumes.
Hydra is a pre-installed tool in Kali Linux used to brute-force username and password to different services such as ftp,
DDoS stands for Distributed Denial of Service. This is a cyber-attack in which the attacker floods the victim’s servers with
We are going to show you how to make a persistent backdoor. Once you exploit some android device just do
USB Rubber Ducky — a device which resembles a regular USB flash drive. When connected to a computer, it claims
Sometimes, during security audits, we may encounter a situation where everything is being managed correctly. In other words security patches, policies,
Without admin privileges, installing additional software, or modifying the Windows 10 firewall, an attacker can alter a router and perform
The tactic of brute-forcing a login, i.e., trying many passwords very quickly until the correct one is discovered, can be
Having an efficient workflow is an integral part of any craft, but it’s especially important when it comes to probing
Nikto is a free software command-line vulnerability scanner that scans webservers for dangerous files/CGIs, outdated server software and other problems.
Learn Termux for hacking !! first, understand what is Termux and follow how to install applications using Termux and the complete Termux command. In this article, I
you want your terminal to be customized with awesome script every time you fire it up, huh?! Well, look no
This is a tutorial explaining how to hack android phones with Kali. I can’t see any tutorials explaining this Hack/Exploit,
After a hacker has configured Metasploit on a remote private server, created a resource script for automation, and created a
It’s easy to run Kali Linux from a live USB on nearly any available computer, but many publicly accessible laptops and
Kali Linux is known as being the de facto penetration-testing Linux distribution but can be a pain to use as
Deleted bank statements and private photos are still within an attacker’s grasp, so don’t think that emptying your recycling bin
Using a keylogger to intercept keys pressed on an infected computer can circumvent encryption used by email and secure chat
The microphone in a Windows computer is accessible to most applications running on the device at all times and completely
A powered-off Windows 10 laptop can be compromised in less than three minutes. With just a few keystrokes, it’s possible
In the penetration testing journey we must learn how to brute force attack. But the success of brute force attack
Install : pip install proxylist pip install mechanize Usage: BruteForce Gmail Attack python3 Brute_Force.py -g Account@gmail.com -l File_list python3 Brute_Force.py
uDork is a script written in Python that uses advanced Google search techniques to obtain sensitive information in files or directories, find
TorghostNG is a tool that make all your internet traffic anonymized through Tor network. Rewritten from TorGhost with Python 3. TorghostNG was
Facebook Brute Forcer in shellscript using TOR Legal disclaimer:Usage of Facebash for attacking targets without prior mutual consent is illegal. It’s the
SocialBox is a Bruteforce Attack Framework [Facebook, Gmail, Instagram,Twitter], Coded By Belahsan Ouerghi. Download Spyboy App Installation sudo apt-get install git sudo git
Instagram-Py is a simple python script to perform basic brute force attack against Instagram , this script can bypass login limiting on wrong passwords , so basically
Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles Using Image Recognition And Reverse Image Search. This only
Fluxion is a security auditing and social-engineering research tool. It is a remake of linset tool by vk496 which is not upgraded
Nowadays people are smart enough. They don’t get trapped under phishing. Because the link does not look like the original
When we install Kali Linux on Desktop or Laptop we didn’t connect it with Wi-Fi. Sometimes internal WiFi adapter not
We are covering dirsearch tutorial in this post. it’s a simple command-line python based website directory/path scanner which can brute-force any targeted
Kali Linux WiFi Adapter The all new Kali Linux 2020 was rolling out and we can simply use it as
Deepmagic Information Gathering Tool (DMitry) is a command-line application coded in C. DMitry has the ability to gather as much as
It is very important to know what technology behind a web app before going against it. Like it would be
Steghide is a command line stenography tool. The word stenography is combination of Greek words “Steganos” that means covered or
Sometime we need to run our localhost website or server over internet. To do this we need to forward our
ZPhisher is an advanced phishing tool-kit it is an upgraded version of Shellphish. It has the main source code from Shellphish but ZPhisher
Aircrack is a software suite for networks, Aircrack can perform network detection, packet-sniffing and cracking WEP/WPA2. Aircrack consists of many
HaxRat is a cloud-based remote android management suite in simple word it is an Android RAT, powered by NodeJS. It