DNS Shell

DNS Shell – Tool to Compromise and Maintain Control Over Victim Machine

DNS protocol runs on the application layer of the TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution) destination server acts as the backdoor. DNS Shell Tool is a python...
JSRAT – Secret Command & Control Channel Backdoor to Control Victims Machine Using JavaScript

JSRAT – Secret Command & Control Channel Backdoor to Control Victims Machine Using JavaScript

JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the server and the target hosts. Here I have used Kali Linux(Attacker Machine) and Victim...
transfer data

How to Transfer Data via Monitor Pixel Color Values (Monitor Screen as Covert Channel)

Assume that you want to transfer data from one machine to another machine. If you use public email services, FTP or any other protocols, you will be easily get caught by software implemented like DLP(Data loss prevention). So,...
HawkEye

New Variant of HawkEye Sold on Hacking Forums and Distributed via Excel and DOC...

Threat actors advertised a new version of the information stealer malware kit HawkEye Reborn v9 that exfiltrates various information from the infected systems. Talos observed the ongoing campaigns targeting organization leveraging HawkEye Reborn v9...
Beef

BeEF – Browser Exploitation Framework Over WPN (Without Port Forwarding)

Beef Xss Framework is a browser exploitation tool. It mainly focuses on client-side attacks and web-based browsers. It helps a penetration tester to understand past the network perimeter and client system. Its available in Kali Linux and...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended