Develop Windows Exploits (Complete Guide)

In this lengthy article we are going to discuss how to develop windows exploits. If you want to be a successful Ethical Hacker or Penetration tester you should have a fair understanding/knowledge of the assembly language to develop windows exploits (custom exploits). Let us...

Penetration Testing IPSec VPN (Virtual Private Network)

Introduction In this article we are going to discuss Penetration Testing IPSec VPN (Virtual Private Network). VPN provide secure (encrypted) communications between remote locations or users within the same network through internet. Basically there are two types of VPNs: IPSec VPN and SSL VPN. IPSec is...

Compromise Remote Access Protocols

Let us discuss about how we can compromise remote access protocols. There was a time when applications that bypass system protocols to provide remote access were famous. Those applications are presently being replaced with online services like GoToMyPC or LogMeIn, they are still quite...

KRACKs Attacks All Things You Need to Know About

In this article we are going to discuss KRACKs attacks. We have witnessed severe weaknesses in WPA2, a protocol that secures all trendy protected Wireless networks. An attacker inside vary of a target can exploit these weaknesses utilizing key reinstallation attacks popularly known as KRACKs....

How Buffer Overflow Attacks Work in Kali Linux

Here is all you need to know about Buffer Overflow Attacks process, how they work? and how to make yourself root user on a computer using a buffer overflow attack in Kali Linux? you may want learn about Fileless attacks also?...

RDPY Security Tool Penetrate into Remote Desktop Protocol

RDPY security tool is a Microsoft RDP Security tool developed in pure Python with RDP (MITM) proxy help. This permits a consumer to document classes and develop honeypot performance. It helps each Microsoft RDP (Distant Desktop Protocol) protocol consumer and server aspect. RDPY security tool...

WAFNinja Kali Linux tool to Bypass WAF

I have added a video tutorial about WAFNinja Kali Linux tool to understand this python tool which can bypass WAF. Basically WAFNinja is a CLI (Command Line Interface) python software that helps penetration testers to bypass Internet Software Firewall by automating steps essential for...

WPSeku Kali Linux (WordPress Security Scanner) Guide

WPSeku Kali Linux (Wordpress Security Scanner) is a blackbox WordPress vulnerability scanner that can be utilized to scan distant WordPress installations to seek out safety points. Also read this updated article on MSF methodologies Abilities of WPSeku WordPress Security Scanner(adsbygoogle =...

Install tools and updates remotely on Kali Nethunter

So here is the complete guide to install tools and updates on Kali Nethunter via secure shell. As a result of individuals like me might get bored when they want to put in instruments that aren't out there on kali from github , and utilizing...

Start Kali Linux with new hostname on every boot

In this article we will discuss how to start kali linux with new hostname on every boot? I did not need to revive an previous / useless thread, however this was such a fantastic thought it simply wanted a little bit updating. Learn also how to...