Ethical Hacking Tutorials

Ethical Hacking Tutorials, Tips and Tricks

Top 5 Publicly Available Hacking Tools Mostly used By Hackers

Cyber Criminals are using various malicious tools for cyber attacks based on the target’s strength to infiltrate the sensitive data and more often nowadays Publicly Available Hacking Tools are mainly used by threat actors for various attacks around the world. Today in the cyber worlds hacking tools are openly available with various functionalities and freely […]

Iceland suffered the most serious attack in the history of the country

A few days ago, Iceland in Europe was hit by a large-scale phishing attack initiated by cybercrime groups. Criminal gangs sent phishing emails to tens of thousands of Icelandic users. Eventually, up to 1,000 people were identified, and other personal information was revealed, which is the most significant and most serious cyber attack in Iceland’s […]

TakeOver : Script Extracts CNAME Record Of All Subdomains At Once

Subdomain takeover is a class of vulnerability where subdomain points to an external service that has been deleted. The external services are Github, Heroku, Gitlab, Tumblr and so on. Let’s assume we have a subdomain sub.example.com that points to an external service such as GitHub. If the Github page is removed by its owner and […]

Sensu 1.6 released0 – Open Source Monitoring Framework

A simple, malleable, and scalable framework for composing the monitoring system you need. It is offered in two flavours: Sensu Core – this open source project Sensu Enterprise – a full-featured commercial implementation, built on Sensu Core It is an open source monitoring framework. Key Features: Automate your monitoring workflows: Limitless pipelines let you validate and correlate […]

Flawfinder v2.0.7 – Searches through C/C++ source code looking for potential security flaws

To run flawfinder, simply give flawfinder a list of directories or files. For each directory given, all files that have C/C++ filename extensions in that directory (and its subdirectories, recursively) will be examined. Thus, for most projects, simply give flawfinder the name of the source code’s topmost directory (use ‘‘.’’ for the current directory), and […]

AutoRDPwn – The Shadow Attack Framework

AutoRDPwn is a script created in Powershell and designed to automate the Shadow attack on Microsoft Windows computers. This vulnerability allows a remote attacker to view his victim’s desktop without his consent, and even control it on request. For its correct operation, it is necessary to comply with the requirements described in the user guide. […]

Andrax – Pentesting Platform for Android Devices

ANDRAX The first and unique Penetration Testing platform for Android smartphones What is ANDRAX ANDRAX is a penetration testing platform developed specifically for Android smartphones, ANDRAX has the ability to run natively on Android so it behaves like a common Linux distribution, But more powerful than a common distribution! Why is Android so powerful? Simple, […]

Ethical Hacking Tutorials © 2018
Skip to toolbar