Monday, October 14, 2019

Tutorials

All the articles under tutorials.

Tutorials

Home Tutorials
All the articles under tutorials.
passive_discovery6

Discover IPv6 Network Range & Hosts from an IPv6 Enabled Network Using passive_discovery6

Passive_discovery6 passively sniffs the network and dump all client's IPv6 addresses detected. Passive_discovery6 simply sniffs for the neighbor-advertisement packet in...
Metasploit Framework

Metasploit Framework Part 2 – msfconsole & Exploiting Vulnerable Linux System

Msfconsole provides a handy all-in-one interface to almost every option and setting available in the Framework; it’s like a one-stop...
Whatweb

whatweb – Tool to Discover Security Vulnerabilities With Your Web Application

Whatweb is the perfect name for this tool. Simply it answers the question, “What is that Website?” Whatweb can identify...
Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety...
tcpflow

Tcpflow – To Monitor, Capture & Dump Packets

Tcpflow is a TCP/IP Demultiplexer. Tcpflow is used to record traffic mainly between 2 hosts although it can be used...
burpsuite

Burpsuite – A Beginner’s Guide For Web Application Security or Penetration Testing

Burpsuite is a collection of tools bundled into a single suite made for Web Application Security or Penetration testing. It's...
Metasploit Framework

Metasploit Framework – A Beginner’s Guide for Penetration Testing, Exploit Development and Vulnerability Research

Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we can regard it as a...
lbd

lbd – Tool to Detect Whether a Domain has Load Balancing Enabled

Load balancing(lbd) is the technique used in different services for balancing the load across different servers or NICs. It can...
Sqlmap

SQLMAP – Enumeration of Databases & Users from Vulnerable Web Forms

Sqlmap is a database assessment tool which pentesters & security researchers can use to enumerate databases of various types. Sqlmap...
ua-tester

Ua-tester – A tool for User Agent WAF, IDS/IPS, Redirection testing

UA-tester is a tool to check whether a website provides different pages for different user agents like for mobile, desktop...

Must Need

Angr

Angr : A Powerful & User-Friendly Binary Analysis Platform

Angr is a platform-agnostic binary analysis framework. It is a suite of Python 3 libraries that let you load a binary and...
Dissertation

How to Write a Dissertation in Less Time Than You Plan

Let's face it. Many students have problems with an adequate estimate of time. When it comes to a particularly difficult task, the...
shellcode-encrypter-decrypter

Shellcode-Encrypter-Decrypter : Shellcode Encrypter & Decrypter by using XOR Cipher

Shellcode-Encrypter-Decrypter is a Shellcode Encrypter & Decrypter, Using XOR Cipher to enc and dec shellcode. Shellcode-Encrypter-Decrypter Installation git clone https://github.com/blacknbunny/Shellcode-Encrypter-Decrypter.git && cd Shellcode-Encrypter-Decrypter/ python enc.py --help Also ReadMunin...
Airgeddon : This Is A Multi-Use Bash Script For Linux Systems To Audit Wireless Networks

Airgeddon : This Is A Multi-Use Bash Script For Linux Systems...

Airgeddon is a multi-use bash script for Linux systems to audit wireless networks. Content & Features
Gpredict

Gpredict – Satellite Tracking Application

Gpredict is a real time satellite tracking and orbit prediction program for the Linux desktop. It uses the SGP4/SDP4 propagation algorithms together with NORAD two-line element...
Goca

Goca : Scanner Used To Find Metadata & Hidden Information

Goca is a FOCA fork written in Go, which is a tool used mainly to find metadata and hidden information...
Log-killer

Log-killer : Clear All Your Logs In Linux & Windows Servers

Log-killer clear all your logs in linux and windows servers. Just download the tool and run it on the server. If your server OS...