Generating an undetectable Payload using Phantom Evasion

Phantom Evasion is a malware stub generator tool written in python both compatible with python 2.7 and 3.4 or higher( note that python 2.7 is required for pyinstaller). The aim of this tool is to make antivirus evasion an easy task for pentesters with...

How to use Anonsurf on Kali Linux?

Anonsurf is a great tool I've used in Parrot OS. This tool is available in Parrot OS but the question is how we can use this tool in Kali Linux. So follow this tutorial to use Anonsurf on Kali Linux.https://www.youtube.com/watch?v=3lZUKLeEYyI

Use Private Search Engine in Kali Linux 2018.2

How to make your own private search engine on Kali Linux 2018.2 with SearX?SearX is a open source search engine project.After watching this tutorial you can able to install your own private search engine very easily. Many people some problem during installation of searX...

Kalibrating Device for GSM and Decoding ADS-B messages

As I have mentioned in my previous article that I'll discuss Kalibrating Device for GSM and Decoding ADS-B messages in my upcoming article so here is the useful guide to get familiar with these methods.This article is the second part of Software Defined RadiosRTLSDR also...

How to use Software Defined Radios

In this article we'll cover how to use software defined radios. This will include following topicsIntroduction to radio frequency scanners Hands-on with RTLSDR scanner Playing around with gqrx Kalibrating device for GSM tapping Decoding ADS-B messages with Dump1090The term software-defined radio means, implementation...

How to Perform Browser Autopwn using Metasploit

Let us discuss about performing browser autopwn that how this module works. This auxiliary module used for performing client-side attacks. Now we need to explore how this module works. Following are steps of browser autopwn.Attacker/Penetration Tester executes the browser_autopwn auxiliary module. Web server is started...

Bypassing antivirus programs using SHELLTER

Shellter is another antivirus evasion tool like veil-evasion framework, which infects the PE dynamically, can be used to inject the shell code into any 32-bit native Windows application. This framework enable us to either customize the payload or utilize the Metasploit framework in a...

Penetration Testing using JexBoss (Practical Guide)

Today we are going to learn about penetration testing using JexBoss. This tool used for penetration testing and exploiting vulnerabilities/weaknesses in JBoss Application Server and other Java Application Servers (for example, WebLogic, GlassFish, Tomcat, Axis2, and so on). This tool is not available in...

Penetration Testing Network Routers using RouterSploit

In this article we're going to discuss penetration testing network routers using RouterSploit in a beginner's way. Basically RouterSploit is a router exploitation framework or we can say penetration testing framework for routers, designed especially for embedded devices.This framework can perform three main modules:...

Penetration Testing Embedded Devices

Let's discuss about penetration testing embedded devices. First we need to know about embedded devices and their types then we'll cover penetration testing embedded devices and I would recommend you to follow this practical guide for penetration testing into IPSec VPNs if you are...