Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

0
Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety of shellcodes to running...

Tcpflow – To Monitor, Capture & Dump Packets

0
Tcpflow is a TCP/IP Demultiplexer. Tcpflow is used to record traffic mainly between 2 hosts although it can be used to monitor thousands of...
IBD

lbd – Tool to Detect Whether a Domain has Load Balancing Enabled

0
Load balancing(lbd) is the technique used in different services for balancing the load across different servers or NICs. It can be in any form....

SQLMAP – Enumeration of Databases & Users from Vulnerable Web Forms

0
Sqlmap is a database assessment tool which pentesters & security researchers can use to enumerate databases of various types. Sqlmap automates a normal &...

Ua-tester – A tool for User Agent WAF, IDS/IPS, Redirection testing

0
UA-tester is a tool to check whether a website provides different pages for different user agents like for mobile, desktop bots etc. Well, this...

Reconnaissance, Identification & Fingerprinting of Web Application Firewall using WAFW00F

0
Web Application firewalls are typically firewalls working on the application layer which monitors & modifies HTTP requests. The key difference is that WAFs work...

Reaver + PixieWPS – Tool to Bruteforce the WPS of a WiFi Router

0
Reaver is a tool to brute-force the WPS of a WIFi router. PixeWPS is a new tool to brute-force the exchanging keys during a...
PEEPDF

PEEPDF : A One Stop Tool for PDF Document Forensic Analysis

0
Peepdf is a tool for the forensic analysis of pdf documents. Most social engineering attacks use a malicious PDF document embedded with java scripts...

How to use Masscan to Enumerate Large Number of Hosts Quickly

0
Masscan has been around for some time now and already it's in use by pentesters all around. It's a reconnaissance tool which can transmit up to 10...

WiFi Stress Testing Using MDK3, Beacon Flooding & Deauthentication Attack.

0
MDK3 is a proof of concept tool. It is used for stress testing 802.11 networks(wifi). It consists of various methods by which we can...
cp command

cp Command: Copy Files and Directories in Linux

0
The cp command, short for "copy," is the main Linux utility for duplicating files and directories. Whether making a backup, organizing a project, or moving content, cp allows...
image osint

Image OSINT

0
Introduction In digital investigations, images often hold more information than meets the eye. With the right tools and techniques, analysts can uncover hidden metadata, find...
cat Command

cat Command: Read and Combine File Contents in Linux

0
The cat command short for concatenate, It is a fast and versatile tool for viewing and merging file contents directly from the Linux terminal. Whether you're...
ports in networking

Port In Networking

0
What is a Port? A port in networking acts like a gateway that directs data to the right program on a device. An IP address...
ls command

ls Command: List Directory Contents in Linux

0
The ls command is fundamental for anyone working with Linux. It’s used to display the files and directories in your current location, helping you stay organized...