Ethical Hacking Tutorials

Ethical Hacking Tutorials, Tips and Tricks

DarkSpiritz v2.0 – A Penetration Testing Framework For Linux, MacOS, And Windows Systems

M4cs | @maxbridglandRyan | @ryan0x1 Version 2.0 UPDATE (READ IMPORTANT)This version should run a lot smoother and have a cleaner UI. Check the reddit post here to see all changes: https://www.reddit.com/r/netsec/comments/9skdju/huge_update_to_darkspiritz_pentesting_framework/ Getting StartedClone the repository with git: git clone https://github.com/DarkSpiritz/DarkSpiritz.git DarkSpiritz wiki available hereTo install DarkSpiritz clone the github repo and run: pip install -r […]

Developer publishes a tool to unlock the bootloader and enable Root Access on Windows Phones

In the Windows mobile phone circle, René Lergner is a very famous cracker. The Windows Phone Internals he designed is the most commonly used auxiliary tool. Running the custom ROM on the Lumia device and letting the Lumia 830 runs Windows 10 on the ARM are based on this tool. Unfortunately, he has said that […]

Real-time File Scanning System: Strelka

Strelka differs from its sibling projects in a few significant ways: Codebase is Python 3 (minimum supported version is 3.6) Designed for non-interactive, distributed systems (network security monitoring sensors, live response scripts, disk/memory extraction, etc.) Supports direct and remote file requests (Amazon S3, Google Cloud Storage, etc.) with optional encryption and authentication Uses widely supported […]

WinSpy – A Windows Reverse Shell Backdoor Creator With An Automatic IP Poisener

WinSpy: Windows Reverse Shell Backdoor Creator With ip poisener. Dependencies 1 – metasploit-framework 2 – xterm 3 – apache2 4 – whiptail Installation sudo apt-get install git git clone https://github.com/TunisianEagles/winspy.git cd winspy chmod +x setup.sh ./setup.sh chmod +x winspy.sh ./winspy.sh Tested on : BackBox Linux Kali linux Parrot os Tutorial Contact   Like this: Like […]

Tumblr serious vulnerability can reveal everyone information

Tumblr, a well-known blog sharing site, just released a security bulletin to reveal serious security vulnerabilities that have been fixed. A security researcher submitted the security breach through a soup-free bounty hunter program that has been fixed by the company’s engineering team. Anyone can use the vulnerability to view other users’ data without any complicated […]

SILENTTRINITY – A Post-Exploitation Agent Powered By Python, IronPython, C#/.NET

A post-exploitation agent powered by Python, IronPython, C#/.NET. Requirements Server requires Python >= 3.7 SILENTTRINITY C# implant requires .NET >= 4.5 How it works Notes .NET runtime supportThe implant needs .NET 4.5 or greater due to the IronPython DLLs being compiled against .NET 4.0, also there is no ZipArchive .NET library prior to 4.5 which […]

PA Toolkit – Wireshark Extensions for Penetration Testers

PA Toolkit is a collection of traffic analysis plugins to extend the functionality of Wireshark from a micro-analysis tool and protocol dissector to the macro analyzer and threat hunter. PA Toolkit contains plugins (both dissectors and taps) covering various scenarios for multiple protocols, including: WiFi (WiFi network summary, Detecting beacon, deauth floods etc.) HTTP (Listing […]

Top 5 Publicly Available Hacking Tools Mostly used By Hackers

Cyber Criminals are using various malicious tools for cyber attacks based on the target’s strength to infiltrate the sensitive data and more often nowadays Publicly Available Hacking Tools are mainly used by threat actors for various attacks around the world. Today in the cyber worlds hacking tools are openly available with various functionalities and freely […]

Ethical Hacking Tutorials © 2018
Skip to toolbar