Adding USB Persistence with LUKS Encryption

Adding USB Persistence with LUKS EncryptionAlternatively, you can create a LUKS-encrypted persistent storage area. This adds an extra layer of security to your sensitive...

Maintaining Access

PowersploitThis is a tool that is for Windows machines. It has PowerShell installed in victims machine. This tool helps the hacker to connect with...

Kali Linux live USB persistence

Adding Persistence to a Kali Linux “Live” USB DriveKali Linux “Live” has two options in the default boot menu which enable persistence — the...

Password cracking Tool

HydraHydra is a login cracker that supports many protocols to attack ( Cisco AAA, Cisco auth, Cisco enable, CVS, FTP, HTTP(S)-FORM-GET, HTTP(S)-FORM-POST, HTTP(S)-GET, HTTP(S)-HEAD,...

Remote Network penetration via NetBios hack/hacking

These are basic techniques but very useful when penetration testing any Windows based network, the techniques were discovered on WinNT but are still very...

Sniffing & spoofing

The basic concept of sniffing tools is as simple as wiretapping and Kali Linux has some popular tools for this purpose.BurpsuiteBurpsuite can be used...

Stressing tools

Stressing tools are used to create DoS attacks or to create the stress test for different applications so as take appropriate measures for the...

Starwars and the 24 other worst password of 2017

You know those corny movie scenes, where someone hacks their boss or girlfriend or enemy’s password by looking around the room and making two...

Social engineering

Social Engineering Toolkit UsageThe Social-Engineer Toolkit (SET) is an open-source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that...

Forensics Tools

p0fp0f is a tool that can identify the operating system of a target host simply by examining captured packets even when the device in question...

Recent Posts