Saturday, May 30, 2020

Tutorials

All the articles under tutorials.

Tutorials

Home Tutorials
All the articles under tutorials.
sqlmap

SQLMAP – Introduction & Automation of SQLi

Basic Operation of SQLMAP & enumeration of Server through automatic SQL Injection. SQLMAP is a database pentesting tool used to automate SQL...
thc-ssl-dos

THC-SSL-DOS – DoS Tool Against Secure Web-Servers and for Testing SSL-Renegotiation

THC is The Hacker's Choice. They are a group of hackers from Germany. Thc-SSL-dos is used for checking whether a...
Unicornscan

Unicornscan – Network Scanning Tool to Find the Open Ports

Unicornscan is an asynchronous network stimulus delivery/response recording tool. Meaning it sends out broken/unorganized/fragmented packets (without a regular pattern unlike...
lbd

lbd – Tool to Detect Whether a Domain has Load Balancing Enabled

Load balancing(lbd) is the technique used in different services for balancing the load across different servers or NICs. It can...
SOC Program

What to Look for in the Right SOC Program – A Complete Guide

SOC stands for "security operations center", and it's important to every business, no matter what it's size. ...

Update Nmap in Kali Linux

Install & Update Nmap in Kali Linux Rolling, Sana & earlier versions This tutorial will show you how to update nmap...
passive_discovery6

Discover IPv6 Network Range & Hosts from an IPv6 Enabled Network Using passive_discovery6

Passive_discovery6 passively sniffs the network and dump all client's IPv6 addresses detected. Passive_discovery6 simply sniffs for the neighbor-advertisement packet in...
WAFW00F

Reconnaissance, Identification & Fingerprinting of Web Application Firewall using WAFW00F

Web Application firewalls are typically firewalls working on the application layer which monitors & modifies HTTP requests. The key difference...
bluelog

Bluelog

Simple Bluetooth Discovery with Bluelog Bluelog is a simple Bluetooth scanner that is designed to essentially do just one thing, log...

Johnny

Lab 2: Test the complexity of a Windows System, Cracking Windows hashes using Johnny When cracking Windows passwords if LM hashing...

Must Need

SSHPrank : A Fast SSH Mass-Scanner, Login Cracker & Banner Grabber

SSHPrank : A Fast SSH Mass-Scanner, Login Cracker & Banner Grabber

SSHPrank is a fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module.
ProcDump

ProcDump : A Linux Version of the ProcDump Sysinternals Tool

It is a Linux re-imagining of the classic ProcDump tool from the Sysinternals suite of tools for Windows. It...
Miteru : An Experimental Phishing Kit Detection Tool

Miteru : An Experimental Phishing Kit Detection Tool

Miteru is an experimental phishing kit detection tool. Following are the features that can be used for the tool;
Exploit Development

Best Exploit Development Resources For Simulated Attacks

An exploit development is a bit of programming, a piece of information, or a grouping of commands that exploits a bug or vulnerability with...
Mallory : HTTP/HTTPS Proxy Over SSH

Mallory : HTTP/HTTPS Proxy Over SSH

Mallory is a HTTP/HTTPS proxy over SSH tool. Installation Local machine: go get github.com/justmao945/mallory/cmd/malloryRemote server:...
Reko

Reko : A General Purpose Decompiler

Reko (Swedish: "decent, obliging") is a C# project containing a decompiler for machine code binaries. This project is freely available under the GNU...
CyberChef

CyberChef – A web App For Encryption, Encoding, Compression & Data...

CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These operations include simple encoding...