Ethical Hacking Tutorials

Ethical Hacking Tutorials, Tips and Tricks

SocialScan – Check Email Address and Username Availability on Online Platforms

Give an email address or username, socialscan returns whether it is available, taken or invalid on online platforms. Its speed also makes it suitable for bulk queries involving hundreds of usernames and email addresses. The following platforms are currently supported: Username Email Instagram ✔️ ✔️ Twitter ✔️ ✔️ GitHub ✔️ ✔️ Tumblr ✔️ ✔️ Lastfm […]

HashCK – Automated Hashcracking Tool

HashCK is a Hash Cracking script that can crack the 10 most popular cryptographic hash algorithms. – Bruteforce Md5 Hash – Bruteforce Sha-1 sha-224 sha-256 sha-384 sha-512 Mysql Hashes – Search Hash in 6 Biggest Online Hash Database – It Has 555372 Cracked Hashes Stored Offline – Fast Numeric Bruteforce Using Md5crack – It includes […]

Loki – Remote Access Tool / Botnet

Loki is Remote Access Tool & uses RSA-2048 with AES-256 to keep your communication secure. Requirements Server tested on Bot tested on Features Upload & Download Chrome Launching Persistence Screenshot Keylogger Ddos SFTP SSH Installation pip install -r requirements.txt Vayne-RaT – An Advanced C# .NET RAT Server side open /lib/ & configure your private […]

US Cyber Command to Implant Malware on the Russian Grid

The US military’s Cyber Command has gotten more aggressive than ever against Russia in the past year, placing “potentially crippling malware” in systems that control the country’s electrical grid In the New York Times’ report this Saturday, the anonymous official was quoted as saying that this was mainly due to the fact that since the […]

Shadow-Box: Lightweight and Practical Kernel Protector for x86

Shadow-box is a security monitoring framework for operating systems using state-of-the-art virtualization technologies. Shadow-box has a novel architecture inspired by a shadow play. We made Shadow-box from scratch, and it is primarily composed of a lightweight hypervisor and a security monitor. The lightweight hypervisor, Light-box, efficiently isolates an OS inside a guest machine and projects […]

Beemka – Electron Exploitation Toolkit

Beemka shows how vulnerabilities in the Electron Framework could allow an attacker to inject malicious code inside a legitimate application without raising any warnings. Notice: Please note that this article is not about vulnerabilities in Electron applications, but the Electron Framework itself. THIS IS NOT A VULNERABILITY IN THE INDIVIDUAL APPS.  Proof of Concept In the […]

Sparrow-Wifi – Graphical WiFi Analyzer for Linux

Sparrow-wifi has been built from the ground up to be the next generation 2.4 GHz and 5 GHz Wifi spectral awareness tool. At its most basic it provides a more comprehensive GUI-based replacement for tools like inSSIDer and linssid that runs specifically on linux. In its most comprehensive use cases, sparrow-wifi integrates wifi, software-defined radio […]

Yaazhini – Free Android APK & API Vulnerability Scanner

Yaazhini is a free vulnerability scanner for android APK and API. It is a user-friendly tool that you can easily scan any APK and API of android application and find the vulnerabilities. Yaazhini includes vulnerability scan of API, the vulnerability of APK and reporting section to generate a report. System Requirements Operating Systems Mac OSX(64bit), […]

RapidScan – The Multi-Tool Web Vulnerability Scanner

Unless you are a pro at automating stuff, it is a herculean task to perform binge-scan for each and every engagement. The ultimate goal of this program is to solve this problem through automation; viz. running multiple scanning tools to discover vulnerabilities, effectively judge false-positives, collectively correlate results and saves precious time; all these under […]

Ethical Hacking Tutorials © 2018
Skip to toolbar