Showing posts from October, 2017
Exploit Windows using Eternalblue & Doublepulsar  (NSA Hacking Tool)

Exploit Windows using Eternalblue & Doublepulsar (NSA Hacking Tool)

Exploit Windows using Eternalblue & Doublepulsar (NSA Hacking Tool)
KRACK - a new attack that can decode / break any WiFi

KRACK - a new attack that can decode / break any WiFi

Key Reinstallation Attack The attack affects all modern WPA2 implementations, and is particularly dangerous on Android 6+ / Linux - you c...
Security risks of the Smart Home and counter strategies

Security risks of the Smart Home and counter strategies

[full-post] The Internet of Things (IoT) also helps the concept of the Smart Home through more and more networked devices to a greater ext...
Scanless - online port scan scrape

Scanless - online port scan scrape

Scanless - online port scan scrape scanless Command-line utility for using websites that can perform port scans on your behalf. Useful...
how to perform call flooding attack

how to perform call flooding attack

how to perform Phone flooding attack tutorial With this small server you can make calls continuously via the internet, with no possib...
routersploit -The Router Exploitation Framework

routersploit -The Router Exploitation Framework

RouterSploit - Router Exploitation Framework The RouterSploit Framework is an open-source exploitation framework dedicated to embedded...
credmap -  The Credential Mapper

credmap - The Credential Mapper

credmap: The Credential Mapper Credmap is an open source tool that was created to bring awareness to the dangers of credential reuse. I...
WPSeku v0.2.1 - Wordpress Security Scanner

WPSeku v0.2.1 - Wordpress Security Scanner

Wordpress Security Scanner WPSeku is a black box WordPress vulnerability scanner that can be used to scan remote WordPress installatio...
WhatWeb - Website Fingerprinter

WhatWeb - Website Fingerprinter

WhatWeb - Website Fingerprinter WhatWeb identifies websites. Its goal is to answer the question, "What is that Website?". W...
wig - WebApp Information Gatherer

wig - WebApp Information Gatherer

wig - WebApp Information Gatherer wig is a web application information gathering tool, which can identify numerous Content Managem...
Man in the Middle attacks

Man in the Middle attacks

Man in the Middle attacks What is a man in the middle? Man in the middle attacks are methods (which have been discussed since 1995), ...

Search

Popular Posts

USB WiFi adapters that support monitor mode and wireless injection

usb wifi adapter with monitor mode and wireless injection (100% compatibl…

how to update Kali Linux and Fix update error

Kali Linux one of the best Linux distro for penetration testing it's freq…

Fix Kali Linux sources.list Repositories

Fix default repository First after installing a clean Kali Linux the sou…

Recent Comments

Contact Me