How to Gather Information of Antivirus in Remote Victim PC using Metasploit
First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC) This module will enumerate the file, directory, process and extension-based exclusions from supported AV products, which...
View ArticleHow to Access Unauthorized on Remote PC using Metasploit
First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC) Once you had a remote shell with Metasploit all now use the Bypass UAC module, set the session number and exploit it use...
View ArticleHow to Create unlimited Folder in Remote Victim PC using Metasploit
First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC) Once you had a remote shell with Metasploit all now use the Bypass UAC module, set the session number and exploit it Now type...
View ArticleKillchain: A Collection of Powerful Hacking Tools
Kill Chain” is a unified console with an anonymizer that will perform these stages of attacks: Reconnaissance Weaponization Delivery Exploit Installation Command & Control And Actions Dependant...
View ArticleSimplyEmail: Email Recon Tools (Email Footprinting)
What is the simple email recon tool? This tool was based off the work of theHarvester and kind of a port of the functionality. This was just an expansion of what was used to build theHarvester and will...
View ArticleWinpayloads: Undetectable Windows Payload Generation
Open you kali Linux terminal and type the following command Git clone https://github.com/Charliedean/Winpayloads.git Now install the downloaded package using ./setup.sh After successful installation,...
View Article3 ways to Capture HTTP Password in Network PC
Cain and Abel First download cain and abel from here and install in your pc. Click on Sniffer Right click on the window and select Scan MAC address option. Now enter the range and click on OK. It will...
View ArticleHack Remote Windows, Linux PC and Android Phone using Msfvenom
msfvenom is a combination of Msfpayload and Msfencode, putting both of these tools into a single Framework The advantages of msfvenom are: One single tool Standardized command line options Increased...
View ArticleHack Windows 7 Password from Guest Account using 2015-1701 Exploit (Easy Way)
From Wikipedia Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are...
View ArticlePrivilege Escalation on Windows 7,8,10, Server 2008, Server 2012 using Potato
First check your IP Address of your local PC using ipconfig command Now open command prompt, type net localgroup administrators command to check who all users are associated with administrator. In my...
View ArticleHack Remote Windows or Linux PC using MPC
Msfvenom Payload Creator (MPC) is a wrapper to generate multiple types of payloads, based on users’ choice. The idea is to be as simple as possible (only requiring one input) to produce their payload....
View ArticleHack Remote Windows PC using VNC Keyboard Remote Code Execution
This module exploits VNC servers by sending virtual keyboard keys and executing a payload. On Windows systems a command prompt is opened and a PowerShell or CMDStager payload is typed and executed. On...
View ArticleHack Remote PC with PHP File using PhpSploit Stealth Post-Exploitation Framework
PhpSploit is a remote control framework, aiming to provide a stealth interactive shell-like connection over HTTP between client and web server. It is a post-exploitation tool capable to maintain access...
View ArticleExploitation of Windows PC using Venom: Shellcode Generator
Open your kali Linux terminal and type the following command git clone git://git.code.sf.net/p/crisp-shellcode-generator/shell crisp-shellcode-generator-shell Open terminal and type ./venom.sh and...
View ArticleHack Gmail or Facebook Password of Remote PC using NetRipper Exploitation Tool
NetRipper is a post exploitation tool targeting Windows systems which uses API hooking in order to intercept network traffic and encryption related functions from a low privileged user, being able to...
View ArticleHack Remote PC with Nettool MitM Pentesting Toolkit
netool.sh is a script in bash to automate frameworks like metasploit, Nmap, Driftnet, SSLstrip, and Ettercap MITM attacks, Retrieves metadata, geo-location of target, as the hability to capture SSL...
View ArticleDenial of Service Attack on Network PC using SET Toolkit
First open your kali Linux application tab in Exploitation Tools and then chose SET Toolkit Now press enter Now choose option 2, “Fast-Track Penetration Testing” and enter Then choose option 2, “Custom...
View ArticleExploit Remote Windows PC using ps1encodeTool
Use to generate and encode a powershell based metasploit payloads. Available output types: raw (encoded payload only – no powershell run options) cmd (for use with bat files) vba (for use with macro...
View Article2 Ways to Hack Windows 10 Password Easy Way
Start your computer and enter into Bios Setup. Change your boot preferences to boot from CD /DVD. Click on Next Now select the “Repair your computer” option from the lower left-hand corner. Then click...
View ArticleFind the Vulnerable Router on Internet using RouterhunterBR
The RouterhunterBR is an automated security tool that finds vulnerabilities and performs tests on routers and vulnerable devices on the Internet. The RouterhunterBR was designed to run over the...
View Article