DDE exploit

Pentesting Windows Using Microsoft Office DDE Exploit (MACROLESS)

DDE exploit also was known as dynamic data exchange, it allows data to be transferred between applications without any interaction from the...
DNS Shell

DNS Shell – Tool to Compromise and Maintain Control Over Victim Machine

DNS protocol runs on the application layer of the TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution)...

Cisco Auditing Tool & Cisco Global Exploiter to Exploit 14 Vulnerabilities in Cisco Switches...

Cisco Global Exploiter (CGE) Cisco Global Exploiter (CGE), is an advanced, simple and fast security testing tool / exploit engine, that is able to exploit...
NetCut

Turnoff Victims Internet Connectivity In LAN and Enjoy High Speed Internet

NetCut is a software which enables a network admin to turn off the internet connection of any machine in a LAN.But It can also...
Linux Exploit Suggester -simple script to keep track of vulnerabilities

Linux Exploit Suggester – A Kali Linux Tool to Find the Linux OS...

According to Kali Tool list, Linux Exploit Suggester provide just a simple script to keep track of vulnerabilities and suggest possible exploits to gain...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security