DNS Shell protocol runs on the application layer of the TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution) destination...
Commix (short for and njection eploiter) has a simple environment and it can be used, by web developers, penetration testers, or even security researchers...
Beef Xss Framework is a browser exploitation tool. It mainly focuses on client-side attacks and web-based browsers.It helps a penetration tester to understand...
Pentesters have a hard time bypassing anti-viruses nowadays Since Antiviruses are evolving as we speak. We at GBHackers decided to put some time to teach...
DDE exploit also known as dynamic data exchange, allows data to be transferred between applications without any interaction from the user. Hackers leveraged this...
The RouterSploit Framework is an open-source exploitation framework devoted to embedded devices. It includes various modules that aid penetration testing operations:exploits – modules that...
Corporate firewalls can block reverse and bind TCP connections. However, corporate firewalls are behind internal networks. So we can use PING as a great convert...
EternalBlue Malware was Developed by National Security Agency (NSA) exploiting Windows-based Server Message Block (SMBv1) it is believed the tool has released by Shadow...
Nowadays many Malware and Payloads are using Encryption techniques and packing techniques using Packers to Evade the Anti Virus Software since AV is Difficult...