Exploitation Tools

Hackers Exploiting Selenium Grid Tool To Deploy Exploit Kit & ProxyjackerHackers Exploiting Selenium Grid Tool To Deploy Exploit Kit & Proxyjacker

Hackers Exploiting Selenium Grid Tool To Deploy Exploit Kit & Proxyjacker

Two campaigns targeting Selenium Grid's default lack of authentication are underway, as threat actors are exploiting this vulnerability to deploy…

7 months ago
Threat Actors Exploiting Legitimate Software For Stealthy Cyber AttacksThreat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks

Threat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks

CAMO, or Commercial Applications, Malicious Operations, highlights attackers' increasing reliance on legitimate IT tools to bypass security defenses, which can…

7 months ago
Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber AttacksHackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks

Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks

Hackers always keep updating their tools and add new ones to adapt to evolving security measures, bypass defenses, and exploit…

8 months ago
TAG-100 Actors Using Open-Source Tools To Attack Gov & Private OrgsTAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and often have extensive community support, making…

9 months ago
EgressBuster – A Pentesting Tool to Compromise Victim via Command & Control using FirewallEgressBuster – A Pentesting Tool to Compromise Victim via Command & Control using Firewall

EgressBuster – A Pentesting Tool to Compromise Victim via Command & Control using Firewall

Network Firewalls acts as a fortification to keep the internal corporate network secure. Many people often think as it is…

2 years ago
Netcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machineNetcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machine

Netcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machine

Netcat is a good build network debugging tool, which can read and write data across computers using TCP or UDP,…

2 years ago
DNS Shell – Tool to Compromise and Maintain Control Over Victim MachineDNS Shell – Tool to Compromise and Maintain Control Over Victim Machine

DNS Shell – Tool to Compromise and Maintain Control Over Victim Machine

DNS Shell protocol runs on the application layer of the TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE…

2 years ago
Commix – Automated All-in-One OS Command Injection and Exploitation ToolCommix – Automated All-in-One OS Command Injection and Exploitation Tool

Commix – Automated All-in-One OS Command Injection and Exploitation Tool

Commix (short for [comm]and [i]njection e[x]ploiter) has a simple environment and it can be used, by web developers, penetration testers,…

2 years ago
BeEF – Browser Exploitation Framework Over WPN (Without Port Forwarding)BeEF – Browser Exploitation Framework Over WPN (Without Port Forwarding)

BeEF – Browser Exploitation Framework Over WPN (Without Port Forwarding)

Beef Xss Framework is a browser exploitation tool. It mainly focuses on client-side attacks and web-based browsers. It helps a…

2 years ago
Penetration Testing with Windows Computer & Bypassing an Antivirus Using VEIL-Framework in Kali LinuxPenetration Testing with Windows Computer & Bypassing an Antivirus Using VEIL-Framework in Kali Linux

Penetration Testing with Windows Computer & Bypassing an Antivirus Using VEIL-Framework in Kali Linux

Pentesters have a hard time bypassing anti-viruses nowadays Since  Antiviruses are evolving as we speak. We at GBHackers decided to put…

2 years ago