Metasploit

Vulnerability Exploitation Tool What is Metasploit? In 2003, H.D. Moore, (a Cyber Security Researcher and Program Developer from the US) started the Metasploit Project with the intention being to create a public and freely accessible resource to obtain exploitable code for research and development. The Metasploit Project is credited with Read more…

Loading

Tools Category

Kali Linux Tools

Information Gathering acccheck ace-voip Amap Automater bing-ip2hosts braa CaseFile CDPSnarf cisco-torch Cookie Cadger copy-router-config DMitry dnmap dnsenum dnsmap DNSRecon dnstracer dnswalk DotDotPwn enum4linux enumIAX Fierce Firewalk fragroute fragrouter Ghost Phisher GoLismero goofile hping3 InTrace iSMTP lbd Maltego Teeth masscan Metagoofil Miranda Nmap ntop p0f Parsero Recon-ng SET smtp-user-enum snmp-check sslcaudit Read more…

Loading

ProRat

What is ProRat ? And how we us it ? ProRat is a Remote Administration Tool made by PRO Group.ProRat was written in C programming language and its capable to work with all windows operating systems.ProRat is made for remoting your own computers from other computers.ProRat supports bir lots of Read more…

Loading

Hack Android

Hack Android with MSFvenom   How To Hack android devices ? This post will teach you how to hack android devices to Control them Remotely.Now days every single person uses android device, people love and easily attract to android device because of its features and functionality but. There are soo Read more…

Loading

Kali Linux Commands

A-Z Kali Linux commands which will help you. Kali Linux commands Function A  apropos  Search Help manual pages (man -k)  apt-get  Search for and install software packages (Debian)  aptitude  Search for and install software packages (Debian)  aspell  Spell Checker  awk  Find and Replace text, database sort/validate/index B  basename  Strip directory Read more…

Loading

SQL Injection

What is SQL Injection? SQL injection (SQLi) is an application security weakness that allows attackers to control an application’s database – letting them access or delete data, change an application’s data-driven behavior, and do other undesirable things – by tricking the application into sending unexpected SQL commands. SQL injection weaknesses Read more…

Loading

Buffer overflow attack

What is Buffer overflow? Buffer overflow, in the presence of a buffer overflow security vulnerabilities in the computer, the attacker can exceed the normal length of the number of characters to fill a domain, usually the memory address. In some cases, these excess characters can be run as “executable” code. Read more…

Loading