How to Gather Recent Files Dump of Remote PC
The dumplinks module is a modified port of Harlan Carvey's lslnk.pl Perl script. This module will parse .lnk files from a user's Recent Documents folder and Microsoft Office's Recent Documents folder,...
View ArticleExploit Windows, Linux or MAC PC using Java Applet JMX Remote Code Execution
This module abuses the JMX classes from a Java Applet to run arbitrary Java code outside of the sandbox as exploited in the wild in February of 2013. Additionally, this module bypasses default security...
View ArticleOWASP Xenotix XSS Exploit Framework v3 2013
IntroductionCross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s. XSS got listed as the top 3rd Vulnerability in the OWASP 2013 Web application Vulnerabilities list....
View ArticleHack Windows PC using Firebird Relational Database CNCT Group Number Buffer...
This module exploits vulnerability in Firebird SQL Server. A specially crafted packet can be sent which will overwrite a pointer allowing the attacker to control where data is read from. Shortly,...
View ArticleHow to install Kali linux
First Download Kali linux from hereBoot your pc with Kali Linux once booted, Select Graphical InstallSelect your language and click continue.Select your Location and click continue.Configure your...
View ArticleHack Windows PC using Java CMM Remote Code Execution
This module abuses the Color Management classes from a Java Applet to run arbitrary Java code outside of the sandbox as exploited in the wild in February and March of 2013. The vulnerability affects...
View ArticleHow to Encrypt Drive of Remote Victim PC
First Hack the Victim PC Using Metaspolit (Tutorial How to Hack Remote PC)Once you got the meterpreter session use ‘shell‘command to get command prompt of  the target.Type manage-bde -status and press...
View ArticleHack Email Password using Iframe URI Phishing
First of all download Super Phisherand create a Phishing page (How to Create Phishing Page)To get the URL of the phishing page upload the page on any webhost / localhost (XAMPP in my case)Replace the...
View ArticleHack Remote PC using Free Float FTP Server USER Command Buffer Overflow
Freefloat FTP Server is prone to an overflow condition. It fails to properly sanitize user-supplied input resulting in a stack-based buffer overflow. With a specially crafted 'USER' command, a remote...
View ArticleHack Windows, Linux or MAC PC using Java Applet Reflection Type Confusion...
This module abuses Java Reflection to generate a Type Confusion, due to a weak access control when setting final fields on static classes, and run code outside of the Java Sandbox. The vulnerability...
View ArticleCutyCapt - A Qt WebKit Web Page Rendering Capture Utility
CutyCapt is a small cross-platform command-line utility to capture WebKit's rendering of a web page into a variety of vector and bitmap formats, including SVG, PDF, PS, PNG, JPEG, TIFF, GIF, and...
View ArticleHack Windows PC using AudioCoder .M3U Buffer Overflow
This module exploits a buffer overflow in Audio Code 0.8.18. The vulnerability occurs when adding an .m3u, allowing arbitrary code execution with the privileges of the user running AudioCoder. This...
View ArticleExploit Remote PC using ERS Viewer 2011 ERS File Handling Buffer Overflow
This module exploits a buffer overflow vulnerability found in ERS Viewer 2011 (version 11.04). The vulnerability exists in the module ermapper_u.dll where the functionERM_convert_to_correct_webpath...
View ArticleRecover Deleted Data from Remote Victim PC
This module list and try to recover deleted files from NTFS file systems. Use the FILES option to guide recovery. Let it empty to enumerate deleted files in the DRIVE. Set FILES to an extension (Ex....
View Article