Ethical Hacking Tutorials

Ethical Hacking Tutorials, Tips and Tricks

CarbonCopy – A Tool Which Creates A Spoofed Certificate Of Any Online Website

A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux. Install Carboncopy git clone https://github.com/paranoidninja/CarbonCopy.git Carboncopy commands python3 carboncopy.py www.facebook.com 443 anyname.exe signed-anyname.exe Screenshot of Carboncopy Like this: Like Loading… Related

RootOS – macOS Root Helper

rootOS tries to use various CVEs to gain sudo or root access. All exploits have an end goal of adding ALL ALL=(ALL) NOPASSWD: ALL to /etc/sudoers allowing any user to run sudo commands.   Exploits CVE-2008-2830 CVE-2015-3760 CVE-2015-5889 CVE-2017-13872 AppleScript Dynamic Phishing Sudo Piggyback Run python root.py Dynamic Phishing Like this: Like Loading… Related

Graphical User Interface for Metasploit Meterpreter and Session Handler: Kage

Kage (ka-geh) is a tool inspired by AhMyth designed for Metasploit RPC Server to interact with meterpreter sessions and generate payloads. For now it only supports windows/meterpreter & android/meterpreter   Getting Started Please follow these instructions to get a copy of Kage running on your local machine without any problems.   Prerequisites   Installing You […]

Legion – Semi-Automated Network Penetration Testing Framework

Legion, a fork of SECFORCE’s Sparta, is an open source, easy-to-use, super-extensible and semi-automated network penetration testing framework that aids in discovery, reconnaissance and exploitation of information systems. Legion is developed and maintained by GoVanguard.     Features Automatic recon and scanning with NMAP, whataweb, nikto, Vulners, Hydra, SMBenum, dirbuster, sslyzer, webslayer and more (with […]

Ghidra – Free Reverse Engineering Tool Released by NSA

NSA released Ghidra a free reverse Engineering tool for Malware analyst with an interactive GUI capability that runs on various platforms including Windows, Mac OS, and Linux and supports a number of processor modules. Ghidra gives flexibility for users to create additional plug-in components and scripts using Java or Python. It helps in analyzing malicious […]

Google Launches Backstory — A New Cyber Security Tool for Businesses

Google’s one-year-old cybersecurity venture Chronicle today announced its first commercial product, called Backstory, a cloud-based enterprise-level threat analytics platform that has been designed to help companies quickly investigate incidents, pinpoint vulnerabilities and hunt for potential threats. Network infrastructures at most enterprises regularly generate enormous amounts of network data and logs on a daily basis that […]

Ethical Hacking Tutorials © 2018
Skip to toolbar