Friday, December 13, 2019

Tutorials

All the articles under tutorials.

Tutorials

Home Tutorials
All the articles under tutorials.
SOC Program

What to Look for in the Right SOC Program – A Complete Guide

SOC stands for "security operations center", and it's important to every business, no matter what it's size. ...
passive_discovery6

Discover IPv6 Network Range & Hosts from an IPv6 Enabled Network Using passive_discovery6

Passive_discovery6 passively sniffs the network and dump all client's IPv6 addresses detected. Passive_discovery6 simply sniffs for the neighbor-advertisement packet in...
Metasploit Framework

Metasploit Framework Part 2 – msfconsole & Exploiting Vulnerable Linux System

Msfconsole provides a handy all-in-one interface to almost every option and setting available in the Framework; it’s like a one-stop...
Whatweb

whatweb – Tool to Discover Security Vulnerabilities With Your Web Application

Whatweb is the perfect name for this tool. Simply it answers the question, “What is that Website?” Whatweb can identify...
Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety...
tcpflow

Tcpflow – To Monitor, Capture & Dump Packets

Tcpflow is a TCP/IP Demultiplexer. Tcpflow is used to record traffic mainly between 2 hosts although it can be used...
burpsuite

Burpsuite – A Beginner’s Guide For Web Application Security or Penetration Testing

Burpsuite is a collection of tools bundled into a single suite made for Web Application Security or Penetration testing. It's...
Metasploit Framework

Metasploit Framework – A Beginner’s Guide for Penetration Testing, Exploit Development and Vulnerability Research

Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we can regard it as a...
lbd

lbd – Tool to Detect Whether a Domain has Load Balancing Enabled

Load balancing(lbd) is the technique used in different services for balancing the load across different servers or NICs. It can...
Sqlmap

SQLMAP – Enumeration of Databases & Users from Vulnerable Web Forms

Sqlmap is a database assessment tool which pentesters & security researchers can use to enumerate databases of various types. Sqlmap...

Must Need

Aron

Aron – A GO Script For Finding Hidden GET & POST...

Aron is a simple GO script for finding hidden GET & POST parameters with bruteforce. Aron Installation $ git clone https://github.com/m4ll0k/Aron.git aron $ cd aron $ go...
JSONBee : A Ready To Use JSONP Endpoints/Payloads To Help Bypass Content Security Policy Of Different Websites

JSONBee : A Ready To Use JSONP Endpoints/Payloads To Help Bypass...

A ready to use JSONP endpoints to help bypass content security policy of different websites. The tool was presented during HackIT 2018...

Update Nmap in Kali Linux

Install & Update Nmap in Kali Linux Rolling, Sana & earlier versions This tutorial will show you how to update nmap in kali linux 2.0....
Vproxy

Vproxy – Forward HTTP/S Traffic To Proxy Instance

Vproxy tool is used to forward HTTP/S traffic to proxy instance. The WIFI proxy option in your mobile device doesn't make you capture all...
BeRoot

BeRoot – Tool To Check Common Windows Mis-configurations

BeRoot is a post exploitation tool to check common Windows misconfigurations to find a way to escalate our privilege. It will be added to...
John The Ripper

John The Ripper – One Stop Password Audit Tool

John The Ripper - A one stop password audit tool for various formats John is a state of the art offline password cracking tool. John...
ISeeYou

ISeeYou : Tool To Get Exact Location of The Users...

ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or...