Commix – Automated All-in-One OS Command Injection and Exploitation Tool

Commix – Automated All-in-One OS Command Injection and Exploitation Tool

Commix (short for and njection eploiter) has a simple environment and it can be used, from web developers, penetration testers or even security researchers to test web applications with the view to find bugs, errors or vulnerabilities related to...

Bypass an Anti Virus Detection with Encrypted Payloads using VENOM Tool

Nowadays many Malware and Payloads are using Encryption techniques and packing techniques using Packers to Evade the Anti Virus Software since AV is Difficult to detect the Encrypted and packed Malware and payload. Here we are going to learn about...
transfer data

How to Transfer Data via Monitor Pixel Color Values (Monitor Screen as Covert channel)

Assume that you want to transfer data from one machine to another machine. If you use public email services, FTP or any other protocols, you will be easily get caught by software implemented like DLP(Data loss prevention). So, here we...
DDE exploit

Exploiting Windows Using Microsoft Office DDE Exploit (MACROLESS)

DDE exploit also was known as dynamic data exchange, it allows data to be transferred between applications without any interaction from the user. Hackers leveraged this method to execute malicious scripts to compromise. It was reported to Microsoft from Sensepost,...

Exploit Windows Remote PC with EternalBlue & DoublePulsar Exploit through Metasploit

EternalBlue Malware Developed by National Security Agency (NSA) exploiting Windows based Server Message Block (SMBv1) and to be believed the tool has released by Shadow Brokers hackers Group in April 2017 and it has been used for Wannacry Cyber...


Signup to get Hacking News & Tutorials to your Inbox

Most Popular