Monday, April 22, 2019

Tutorials

All the articles under tutorials.

Tutorials

Home Tutorials
All the articles under tutorials.
passive_discovery6

Discover IPv6 Network Range & Hosts from an IPv6 Enabled Network Using passive_discovery6

Passive_discovery6 passively sniffs the network and dump all client's IPv6 addresses detected. Passive_discovery6 simply sniffs for the neighbor-advertisement packet in...
Metasploit Framework

Metasploit Framework Part 2 – msfconsole & Exploiting Vulnerable Linux System

Msfconsole provides a handy all-in-one interface to almost every option and setting available in the Framework; it’s like a one-stop...
Whatweb

whatweb – Tool to Discover Security Vulnerabilities With Your Web Application

Whatweb is the perfect name for this tool. Simply it answers the question, “What is that Website?” Whatweb can identify...
Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety...
tcpflow

Tcpflow – To Monitor, Capture & Dump Packets

Tcpflow is a TCP/IP Demultiplexer. Tcpflow is used to record traffic mainly between 2 hosts although it can be used...
burpsuite

Burpsuite – A Beginner’s Guide For Web Application Security or Penetration Testing

Burpsuite is a collection of tools bundled into a single suite made for Web Application Security or Penetration testing. It's...
Metasploit Framework

Metasploit Framework – A Beginner’s Guide for Penetration Testing, Exploit Development and Vulnerability Research

Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we can regard it as a...
lbd

lbd – Tool to Detect Whether a Domain has Load Balancing Enabled

Load balancing(lbd) is the technique used in different services for balancing the load across different servers or NICs. It can...
Sqlmap

SQLMAP – Enumeration of Databases & Users from Vulnerable Web Forms

Sqlmap is a database assessment tool which pentesters & security researchers can use to enumerate databases of various types. Sqlmap...
ua-tester

Ua-tester – A tool for User Agent WAF, IDS/IPS, Redirection testing

UA-tester is a tool to check whether a website provides different pages for different user agents like for mobile, desktop...

Must Need

Camelishing

Camelishing – Social Engineering Tool

Camelishing is a Social Engineering tool with the features like Bulk email sending, Basic Python Agent Creator, Office Excel Macro Creator, DDE Excel Creator(or...
Just-Metadata

Just-Metadata : Tool That Gathers & Analyzes Metadata About IP Addresses

Just-Metadata is a tool that can be used to gather intelligence information passively about a large number of IP addresses, and...
Droidefense

Droidefense – Advance Android Malware Analysis Framework

Droidefense (originally named atom: analysis through observation machine)* is the codename for android apps/malware analysis/reversing tool. It was built focused on security issues and...
Pompem

Pompem : Tool For Exploits & Vulnerability in Database

Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases....
AWS Key Disabler

AWS Key Disabler – Lambda Script That Will Disable Access Keys...

The AWS Key disabler is a Lambda Function that disables AWS IAM User Access Keys after a set amount of time in order to...
CGPwn

CGPwn – Ubuntu VM For Hardware Hacking, RE and Wargaming

CGPwn is a lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming task. Tools included in CGPwn; Fire up the VM git clone https://github.com/0xM3R/cgPwn cd...
CVE-Search

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

CVE-Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing...