GBH
GBH
Home Exploitation Tools

Exploitation Tools

4CAN – Cisco Released New Open Source Security Tool to Find Security Vulnerabilities in Modern Cars

4CAN – Cisco Released New Open Source Security Tool to Find Security Vulnerabilities in...

0
Cisco released an open-source hardware tool called "4CAN" for automobile security researchers and car manufacturers to find the potential security vulnerabilities in connected cars...
Commando VM 2.0

Commando VM 2.0 – A New Version of Offensive Pentesting VM Updated With ...

0
Commando VM 2.0, a new version of Windows-based security distribution released for penetration testing community and red teamers with updated hacking tools and new...

Netcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machine

0
Netcat is a well build network debugging tool, which can read and write data across computers using TCP or UDP, it is also called...
EgressBuster  – A Pentesting Tool to Compromise Victim via Command & Control using Firewall

EgressBuster – A Pentesting Tool to Compromise Victim via Command & Control using...

0
Network Firewalls acts as a fortification to keep the internal corporate network secure. Many people often think as it is protecting a device from...

Pentesting Windows Using Microsoft Office DDE Exploit (MACROLESS)

0
DDE exploit also was known as dynamic data exchange, it allows data to be transferred between applications without any interaction from the user. Hackers...

RouterSploit – Exploitation Framework for Embedded devices

3
The RouterSploit Framework is an open-source exploitation framework devoted to embedded devices. It includes various modules that aid penetration testing operations: exploits – modules that...

How to Transfer Data via Monitor Pixel Color Values (Monitor Screen as Covert Channel)

0
Assume that you want to transfer data from one machine to another machine. If you use public email services, FTP or any other protocols, you...

New Variant of HawkEye Sold on Hacking Forums and Distributed via Excel and DOC...

0
Threat actors advertised a new version of the information stealer malware kit HawkEye Reborn v9 that exfiltrates various information from the infected systems. Talos observed...

BeEF – Browser Exploitation Framework Over WPN (Without Port Forwarding)

1
Beef Xss Framework is a browser exploitation tool. It mainly focuses on client-side attacks and web-based browsers. It helps a penetration tester to understand...

Malicious Payload Evasion Techniques with Advanced Exploitation Frameworks

0
Sophisticated threats are Evolving with much more advanced capabilities and giving more pain for analysis even evade the advanced security software such as Antivirus. This...

Penetration Testing as a Service

Website

Complete Free Website Security Check

Website

Recent Posts