GBH
GBH

Velayutham Selvaraj

Pentesting Windows Using Microsoft Office DDE Exploit (MACROLESS)

DDE exploit also was known as dynamic data exchange, it allows data to be transferred between applications without any interaction from the user. Hackers leveraged this method to execute malicious scripts to compromise. It was reported to Microsoft from Sensepost,...

Perform Vulnerability Scanning in Your Network using Maltego

Maltego is an intelligence gathering tool, its available for windows, mac, and Linux. We will be using Kali Linux where it's available by default. Remember to register on their website and I have it configured. There are a lot of...

BeEF – Browser Exploitation Framework Over WPN (Without Port Forwarding)

Beef Xss Framework is a browser exploitation tool. It mainly focuses on client-side attacks and web-based browsers. It helps a penetration tester to understand past the network perimeter and client system. Its available in Kali Linux and other penetration...

Penetration Testing with Windows Computer & Bypassing an Antivirus Using VEIL-Framework in Kali Linux

Pentesters have a hard time bypassing anti-viruses nowadays Since  Antiviruses are evolving as we speak. We at www.gbhackers.com decided to put some time to teach how to Bypassing an Antivirus with most common free AV's we come across in our...

Can Instagram Be Hacked Or A Hoax ?

0day.today is an old database where zero-day exploits are sold, only 2009 kids remember this since its outdated after the bug bounty evolvements in the Information Security industry. The website claims to have "Instagram bypass access account private method exploit...
spot_img

latest articles