RouterSploit – Exploitation Framework for Embedded devices

The RouterSploit Framework is an open-source exploitation framework devoted to embedded devices. It includes various modules that aid penetration testing operations: exploits – modules that take advantage of identified vulnerabilities creds – modules designed to test credentials against network...
Bypassing an Antivirus

Penetration Testing with Windows Computer & Bypassing an Antivirus Using VEIL-Framework in Kali Linux

Pentesters have a hard time bypassing anti-viruses nowadays Since  Antiviruses are evolving as we speak. We at www.gbhackers.com decided to put some time to teach how to Bypassing an Antivirus with most common free AV's we come across in our...
Netcat

Netcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machine

Netcat is a well build network debugging tool, which can read and write data across computers using TCP or UDP, it is also called as TCP/IP utilities. It is capable to act as master and slave to do file transfer,...
Kali Linux Tutorial

XERXES – Penetration Testing with Most Powerful Tool For DoS Attack using Kali...

In this Kali Linux Tutorial, we show you how to use Xerxes in launching a DOS attack. DDOS tools are capable of putting heavy loads on HTTP servers and bring them to their knees by exhausting its resources. What is...
Commix – Automated All-in-One OS Command Injection and Exploitation Tool

Commix – Automated All-in-One OS Command Injection and Exploitation Tool

Commix (short for and njection eploiter) has a simple environment and it can be used, from web developers, penetration testers or even security researchers to test web applications with the view to find bugs, errors or vulnerabilities related to...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended