Windows Kung Fu Command Line

Windows Kung Fu Command Line Enable RDP reg add “hklm\system\currentcontrolset\control\terminal server” /f /v fDenyTSConnections /t REG_DWORD /d 0 netsh firewall set service remoteadmin enable netsh firewall set service remotedesktop enable View user on group net localgroup Users net localgroup Administrators search all .doc file dir/s *.doc Start a new CMD Read more…

Loading

Web vulnerability scanning modules in Metasploit

Web vulnerability scanning modules in Metasploit   Information gathering web server scanning module Module auxiliary/scanner/http/http_version Module auxiliary/scanner/http/open_proxy Module auxiliary/scanner/http/robots_txt Module auxiliary/scanner/http/frontpage_login Module auxiliary/admin/http/tomcat_administration Module auxiliary/admin/http/tomcat_utf8_traversal Module auxiliary/scanner/http/options Module auxiliary/scanner/http/drupal_views_user_enum Module auxiliary/scanner/http/scraper Module auxiliary/scanner/http/svn_scanner Module auxiliary/scanner/http/trace Module auxiliary/scanner/http/vhost_scanner Module auxiliary/scanner/http/webdav_internal_ip Module auxiliary/scanner/http/webdav_scanner Module auxiliary/scanner/http/webdav_website_content   File directory scan module Module auxiliary/dos/http/apache_range_dos Read more…

Loading

Tools Category

Tools for Ethical Hackers

Tools for Ethical Hackers   If you are using any Penetration Testing distribution like Kali Linux, BackBox, Lion Sec… you have many pentest tools. I guess that you can not miss or use all of them. I use Linux Ubuntu for Penetration Testing, so i usually install some powerful pentest Read more…

Loading

Tools Category

SQL Vulnerability Scanner (Whitewidow)

SQL Vulnerability Scanner Whitewidow Whitewidow is an open source automated SQL vulnerability scanner, that is capable of running through a file list, or can scrape Google for potential vulnerable websites. It allows automatic file formatting, random user agents, IP addresses, server information, multiple SQL injection syntax, ability to launch sqlmap Read more…

Loading

HoneyPot & HoneyNet

Virtual attack and defense system   A honeypot is a term used to describe a computer or network setup with the purpose of attracting computer hackers. These computers allow a system administrator or security expert to analyze how a computer hacker may attempt to hack a network without risking the Read more…

Loading

Most common types of virus

Most common types of virus   A computer virus is a program, script, or macro designed to cause damage, steal personal information, modify data, send e-mail, display messages, or some combination of these actions. When the virus is executed, it spreads by copying itself into or over data files, programs, Read more…

Loading

T-UI Launcher

Turns Android Device into Linux Command Line Interface   Are you a command line guru, or do you simply want to make your Android device unusable for friends and family, then check out T-UI Launcher app. Unix/Linux users will definitely love this. T-UI Launcher is a free lightweight Android app Read more…

Loading