Ethical Hacking Tutorials

Ethical Hacking Tutorials, Tips and Tricks

Category: Hack Tools

XSS Chef: Generating Custom XSS payloads

XSS Chef is a small React.js application inspired by CyberChef, which provides users with a modular way to build JavaScript payloads to typically be used during penetration tests to demonstrate cross-site scripting vulnerabilities. A live copy of the application can be found here. The current set of recipes can be found below, along with a description […]

UACME v3.1.5 releases: Defeating Windows User Account Control

Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor. x86-32/x64 Windows 7/8/8.1/10TH1/10TH2/10RS1/10RS2 (client, some methods, however, works on server version too). Admin account with UAC set on default settings required. git clone Run executable from command line: akagi32 [Key] [Param] or akagi64 [Key] [Param]. See “Run examples” below for more info. First, param […]

Scapy – Interactive Packet Manipulation Tool

Scapy is a very powerful packet manipulation program and library, written in Python. It allows you to: forge / decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, etc. This tool can also perform tasks such as scanning, trace-routing, probing, unit tests, attacks, network discovery, and much more. (official […]

Remot3d: An Simple Exploit for PHP Language

Remot3d is a simple tool created for large pentesters, security researchers, but also just for the pleasure to exploit a systems/servers that runs a PHP program language. Note: Modifications, changes/alterations to this source code is acceptable. But know that any public releases utilizing this code must be approved by author of this tool. Remot3d: An […]

CANalyzat0r – Security Analysis Toolkit for Proprietary Car Protocols

While car manufacturers steadily refine and advance vehicle systems, requirements of the underlying networks increase even further. Striving for smart cars, a fast-growing amount of components are interconnected within a single car. This results in specialized and often proprietary car protocols built based on standardized technology. Most of these protocols are based on bus protocols: […]

Killcast – Manipulate Chromecast Devices in your Network

This tool is a Proof of Concept and is for Research Purposes Only, killcast shows how Chromecast devices can be easily manipulated and hijacked by anyone. Features Extract Interesting Information such as Build Version, Country, Timezone etc Rename Reboot Perform Factory Reset Kill Active Applications such as YouTube, Netflix and Google Play Music What is […]

Realtime Scrapper: Scrap all pasties,github,reddit..etc in real time

RTS (Realtime scrapper) is a tool developed to scrap all pasties,github,reddit..etc in real time to identify the occurrence of search terms configured. Upon the match, an email will be triggered. Thus allowing the company to react in case of leakage of code, any hacks tweeted..etc.. and harden themselves against an attack before it goes viral. […]

H8Mail – Email OSINT and password breach hunting.

Use h8mail to find passwords through different breach and reconnaissance services, or the infamous Breached Compilation torrent Features 🔎 Email pattern matching (reg exp), useful for all those raw HTML files 🐳 Small and fast Alpine Dockerfile available ✅ CLI or Bulk file-reading for targeting 📝 Output to CSV file ➿ Reverse DNS + Open […]

Ethical Hacking Tutorials © 2018
Skip to toolbar