Hack Remote Windows 10 PC using Cypher (Adding Shellcode to PE files)
First clone cypher repository from github, to do so type: git clone https://github.com/xan7r/cypher.git Now choose an executable file and copy to cypher folder to bind the cypher with any .exe file...
View ArticleHack Remote Windows PC using Dell SonicWALL Scrutinizer 11.01 methodDetail...
This module exploits a vulnerability found in Dell SonicWALL Scrutinizer. The methodDetail parameter in exporters.php allows an attacker to write arbitrary files to the file system with an SQL...
View ArticleExploit Remote PC using Advantech WebAccess Dashboard Viewer upload Image...
This module exploits an arbitrary file upload vulnerability found in Advantech WebAccess 8.0. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of...
View ArticleAccess Sticky keys Backdoor on Remote PC with Sticky Keys Hunter
This bash script tests for sticky keys and utilman backdoors. The script will connect to an RDP server; send both the sticky keys and utilman triggers and screenshot the result. How does it work?...
View ArticleHack Gmail and Facebook Password in Network using Bettercap
Note: In my case this trick works for only Internet Explorer users Bettercap is a complete, modular, portable and easily extensible MITM tool and framework with every kind of diagnostic and offensive...
View ArticleHack WordPress Server using WordPress SlideShow Gallery Authenticated File...
The WordPress SlideShow Gallery plugin contains an authenticated file upload vulnerability. An attacker can upload arbitrary files to the upload folder. Since the plugin uses its own file upload...
View ArticleHacking WordPress using Ninja Forms Unauthenticated File Upload
Versions 2.9.36 to 2.9.42 of the Ninja Forms plugin contain an unauthenticated file upload vulnerability, allowing guests to upload arbitrary PHP code that can be executed in the context of the web...
View ArticlePenetration Testing in WordPress Website using WordPress Exploit Framework
A Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems first clone WPXF repository from github, to do so type:...
View ArticleHack Remote PC with Reverse PowerShell using Brosec
Brosec is a terminal based reference utility designed to help us infosec bros and broettes with useful (yet sometimes complex) payloads and commands that are often used during work as infosec...
View ArticleBypass All Antivirus and Hack Remote Windows 10 PC using Hercules
HERCULES is a special payload generator that can bypass all antivirus software. First clone Hercules repository from github, to do so type: https://github.com/EgeBalci/HERCULES.git Now Open kali linux...
View ArticleHack your Network through Android Phone using cSploit
First download the CSploit from here and install in your android phone Now open your cSploit and select your network and select the target IP which you want to hack. Now select MITM option, see the...
View ArticleExploiting OS Command Injection in Web Application using Commix
Commix (short for [comm]and [i]njection e[x]ploiter) is an automated tool written by Anastasios Stasinopoulos that can be used from web developers, penetration testers or even security researchers in...
View ArticleHack Remote PC using BrowserBackdoor – JavaScript WebSocket Backdoor
BrowserBackdoor is an Electron application that uses a JavaScript WebSocket Backdoor to connect to the listener. BrowserBackdoorServer is a WebSocket server that listens for incoming WebSocket...
View ArticleAutomating Exploitation of Remote PC using Metasploithelper
Metasploit contains port-based modules as well as URI-based modules (web servers). This tool bridges Nmap XML file with Metasploit and generates a resource script containing matching Metasploit...
View ArticleHow to Create Botnet for D-Dos Attack with UFONet
Remember: this tool is NOT for educational purpose. Usage of UFONet for attacking targets without prior mutual consent is illegal. It is the end user’s responsibility to obey all applicable local,...
View ArticleHack Wireless Network using Airgeddon
Airgeddon is a multi-use bash script for Linux systems to audit wireless networks. Features Interface mode switcher (Monitor-Managed). DoS over wireless networks with different methods. Assisted...
View ArticleHack Wi-Fi using Social Engineering with Fluxion (Evil Twin Attack)
Fluxion is a remake of linset by vk439 with less bugs and more features. It’s compatible with the latest release of Kali (Rolling). How it works Scan the networks. Capture a handshake (can’t be used...
View ArticleCracking WiFi Password using Fern WIFi Cracker
Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to crack and recover...
View ArticleDetect Hacker in Network using Android Phone
HosTaGe is a mobile honeypot that detects attacks on wireless networks. First of all search for HosTaGe honeypot on android play store. Now click on the above shown app and install it. Now for testing...
View ArticleWifi Penetration Testing using Gerix Wifi Cracker
GERIX WIFI CRACKER is a GUI wireless 802.11 penetration tools which uses the aircrack-ng method behind its point and click method to crack the wifi password. First of all clone the github repo with...
View Article