PRINT
PRINT
SEND MAIL
SEND MAIL

Category: penetration testing

TUTORIALS

Earn Bitcoins just by surfing Online !

Use CryptoTab as your default browser to maximize your revenue Mining speed increases when your browser is active. Use CryptoTab browser for your everyday activities, visit your favorite sites, watch movies online, and take advantage of maximum mining power. Browser with built-in mining CryptoTab Browser includes built-in mining algorithm that allows using your computer resources more effectively than in extension format. It boosts your mining speed up to 8 times and increases BTC earnings. Enhance your browser with over 150 thousand extensions Set up…

TUTORIALS

Cerberus Linux v1 Subsystem for Windows 10!

Cerberus Linux subsystem is Linux to run on top windows! like the picture bellow^^^ Cerberus linux v1 tools and extras : 15 new Cerberus Frameworks : Metapackages , containers with custom scripts within! Exploits (to analyze): EARLYSHOVEL RedHat 7.0 – 7.1 Sendmail 8.11.x exploit EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86. ECHOWRECKER remote Samba 3.0.x Linux exploit. EASYBEE appears to be an MDaemon email server vulnerability EASYFUN EasyFun 2.2.0 Exploit for WDaemon…

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

Debian

Cerberus Linux v3

  Cerberus Linux v3  Cerberus is a penetration testing distribution focusing on automation and anonymity , it aims to have the best tools available on the hacking scene tools like Fuzzbunch, Dandespritz, Cobalt strike, Armitage, Metasploit framework and Metasploit community version set up and ready for use!! It includes custom scripts, custom themes, custom icons!Cerberus distribution is based on Debian testing, it has the capability to use 3 repositories to install packages from kali repo,Debian repo, and cyber sec repo! Cerberus is an Angry…

Hacking Toolspenetration testingTUTORIALS

Comprehensive Guide on Dymerge

Hello friends! This article is comprehensive guide on the Dymerge tool. This is a handy little tool that helps you manage all the dictionaries that you’ve created reading through our blog and using all the amazing tools we’ve written about. Table of Content What is Dymerge Installing and Launching Dymerge Standard Merge Fast Mode Removing Duplicates Reverse Listing Alphabetic and Numeric Sorting Defining Output Including Characters Compressing Output Introduction to Dymerge Dymerge is a tool that gives you the ability to manage dictionaries. By…

penetration testingTUTORIALS

Comprehensive Guide on Pydictor – A wordlist Generating Tool

In this article we will explore another dictionary building tool “Pydictor”. These tools are always fun to work with, this is another robust tool perfect for generating custom dictionaries. The thing that stands out most about this tool is the customization options it offers, from the most common to the advance. Table of Content What is Pydictor Installation Numeric Dictionary Lower Case Alphabet Dictionary Upper Case Alphabet Dictionary Numeral Coupled With Upper Case Alphabet Upper Case Coupled With Lower Case Alphabet Numeral Coupled With…

Infection MonkeyNEW TOOLSpenetration testingPentestSecurity AutomationSecurity Tools

Infection Monkey v1.6 – An Automated Pentest Tool

The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self-propagate across a data center and reports success to a centralized Monkey Island server.The Infection Monkey is comprised of two parts:Monkey - A tool which infects other machines and propagates to themMonkey Island - A dedicated server to control and visualize the Infection Monkey's progress inside the data centerTo read more about the Monkey, visit ;

penetration testingTUTORIALS

Comprehensive Guide on Cupp– A wordlist Generating Tool

Hello Friends!! Today we are going explore the function of Cupp which is an authoritative tool that creates a wordlist especially particular for a person that can be use while making brute force attack for guessing login credential. Table of Content Introduction to Cupp How Cupp Works Getting Started Generating Custom Dictionary Adding to Custom Dictionary Downloading Dictionaries from Cupp Repository  Downloading Default Usernames and Passwords Quiet Mode Introduction to Cupp Cupp stand for Common User Passwords Profiler and this tool can be used…

Hacking Toolspenetration testingTUTORIALS

Comprehensive Guide on Dirbuster Tool

In this article, we are focusing on transient directory using Kali Linux tool Dibuster and trying to find hidden files and directories within a web server. Table of Content What is DirBuster Default Mode GET Request Method Pure Brute Force (Numeric) Single Sweep (Non-recursive) Targeted Start Blank Extensions Search by File Type (.txt) Changing DIR List Following Redirects Attack Through Proxy Adding File Extensions Evading Detective Measures (Requests Per Second) What is DirBuster DirBuster is an application within the Kali arsenal that is designed…

Hacking Toolspenetration testingTUTORIALS

Comprehensive Guide on Cewl Tool

Hello Friends!! In this article we are focusing on Generating Wordlist using Kali Linux tool Cewl and learn more about its available options. Table of Content Introduction to Cewl Default Method Save Wordlist in a file Generating Wordlist of Specific Length Retrieving Emails from a Website Count the number of Word Repeated in a website Increase the Depth to Spider Extra Debug Information Verbose Mode Generating Alpha-Numeric Cewl with Digest/Basic Authentication Proxy URL Introduction to Cewl CeWL is a ruby app which spiders a…

AWSAWS SecurityBackdooringNEW TOOLSPacupenetration testingPython3ReportingRhinoWeb Services

Pacu – The AWS Exploitation Framework, Designed For Testing The Security Of Amazon Web Services Environments

Pacu is an open source AWS exploitation framework, designed for offensive security testing against cloud environments. Created and maintained by Rhino Security Labs, Pacu allows penetration testers to exploit configuration flaws within an AWS account, using modules to easily expand its functionality. Current modules enable a range of attacks, including user privilege escalation, backdooring of IAM users, attacking vulnerable Lambda functions, and much more.InstallationPacu is a fairly lightweight program, as it requires only Python3.5+ and pip3 to install a handful of Python libraries. Running…

penetration testingTUTORIALS

Socks Proxy Penetration Lab Setup using Microsocks

Hello friends!! In our previous article we have disccuss “Web Proxy Penetration Lab Setup Testing using Squid” and today’s article we are going to setup SOCKS Proxy to use it as a Proxy Server on Ubuntu/Debian machines and will try to penetrate it. Table of Content Intoduction to proxy What is socks proxy Difference Between Socks proxy and HTTP Proxy Socks proxy Installation Web Proxy Penetration Testing SSH Proxy Penetration Testing FTP Proxy Penetration Testing Intoduction to Proxy A proxy is a computer system…

penetration testingTUTORIALS

Web Proxy Penetration Lab Setup Testing using Squid

In this article we are going to setup Squid to use it as a Proxy Server on Ubuntu/Debian machines and will try to penetrate it. Table of content Introduction to Proxy Setting Squid Proxy Installation Squid Proxy Server Configuration Configuring Apache service for Web Proxy Web Proxy Penetration Testing Directory Brute force Attack on Proxy Server Using DIRB Tool Vulnerability Scanning on Proxy Server Using Nikto Tool SQL Injection on Proxy Server Using Sqlmap Tool WordPress Scanning on Proxy Server Using WPScan Tool Introduction…