Sunday, April 11, 2021

Tutorials

All the articles under tutorials.

Tutorials

Home Tutorials
All the articles under tutorials.
Sqlmap

SQLMAP – Enumeration of Databases & Users from Vulnerable Web Forms

Sqlmap is a database assessment tool which pentesters & security researchers can use to enumerate databases of various types. Sqlmap...
ua-tester

Ua-tester – A tool for User Agent WAF, IDS/IPS, Redirection testing

UA-tester is a tool to check whether a website provides different pages for different user agents like for mobile, desktop...
WAFW00F

Reconnaissance, Identification & Fingerprinting of Web Application Firewall using WAFW00F

Web Application firewalls are typically firewalls working on the application layer which monitors & modifies HTTP requests. The key difference...
reaver

Reaver + PixieWPS – Tool to Bruteforce the WPS of a WiFi Router

Reaver is a tool to brute-force the WPS of a WIFi router. PixeWPS is a new tool to brute-force the...
Peepdf

PEEPDF : A One Stop Tool for PDF Document Forensic Analysis

Peepdf is a tool for forensic analysis of pdf documents. Most social engineering attacks use a malicious PDF document embedded...
Masscan

How to use Masscan to Enumerate Large Number of Hosts Quickly

Masscan has been around for some time now and already it's in use by pentesters all around. It's a reconnaissance tool which can...
mdk3

WiFi Stress Testing Using MDK3, Beacon Flooding & Deauthentication Attack.

MDK3 is a proof of concept tool. It is used for stress testing 802.11 networks(wifi). It consists of various methods...
Unicornscan

Unicornscan – Network Scanning Tool to Find the Open Ports

Unicornscan is an asynchronous network stimulus delivery/response recording tool. Meaning it sends out broken/unorganized/fragmented packets (without a regular pattern unlike...
thc-ssl-dos

THC-SSL-DOS – DoS Tool Against Secure Web-Servers and for Testing SSL-Renegotiation

THC is The Hacker's Choice. They are a group of hackers from Germany. Thc-SSL-dos is used for checking whether a...
netdiscover

Netdiscover – Live Host Identification

Netdiscover - simple ARP Scanner to scan for live hosts in a network Netdiscover is a simple ARP scanner which can...

Must Need

KisMac2

KisMac2 – Free Open Source Wireless Stumbling & Security Tool For...

KisMAC2 is a free, open source wireless stumbling and security tool for Mac OS X. This project, is an active project to continue where...
Pwned : Simple CLI Script To Check If You Have A Password

Pwned : Simple CLI Script To Check If You Have A...

Pwned is a simple command-line python script to check if you have a password that has been compromised in a data breach....
The Role of Digital Forensics in Solving Cyber Crimes

The Role of Digital Forensics in Solving Cyber Crimes

Your mobile app developers today have to understand more than simply putting together some code. They have to understand cybersecurity practices so...
Eaphammer : Targeted Evil Twin Attacks Against Wpa2-Enterprise Networks

Eaphammer : Targeted Evil Twin Attacks Against Wpa2-Enterprise Networks

EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope...
GCPBucketBrute  : A Script To Enumerate Google Storage Buckets

GCPBucketBrute : A Script To Enumerate Google Storage Buckets

GCPBucketBrute is a script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can...
Chameleon : Customizable Honeypots For Monitoring Network Traffic

Chameleon : Customizable Honeypots For Monitoring Network Traffic

Chameleon is a customizable honeypots for monitoring network traffic, bots activities and usernamepassword credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP,...
Corsy : CORS Misconfiguration Scanner

Corsy : CORS Misconfiguration Scanner

Corsy is a lightweight program that scans for all known misconfigurations in CORS implementations.