Exploitation Tools

Threat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks

CAMO, or Commercial Applications, Malicious Operations, highlights attackers' increasing reliance on legitimate IT tools to bypass security defenses, which can…

5 months ago

Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks

Hackers always keep updating their tools and add new ones to adapt to evolving security measures, bypass defenses, and exploit…

6 months ago

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and often have extensive community support, making…

6 months ago

EgressBuster – A Pentesting Tool to Compromise Victim via Command & Control using Firewall

Network Firewalls acts as a fortification to keep the internal corporate network secure. Many people often think as it is…

2 years ago

Netcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machine

Netcat is a good build network debugging tool, which can read and write data across computers using TCP or UDP,…

2 years ago

DNS Shell – Tool to Compromise and Maintain Control Over Victim Machine

DNS Shell protocol runs on the application layer of the TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE…

2 years ago

Commix – Automated All-in-One OS Command Injection and Exploitation Tool

Commix (short for [comm]and [i]njection e[x]ploiter) has a simple environment and it can be used, by web developers, penetration testers,…

2 years ago

BeEF – Browser Exploitation Framework Over WPN (Without Port Forwarding)

Beef Xss Framework is a browser exploitation tool. It mainly focuses on client-side attacks and web-based browsers. It helps a…

2 years ago

Penetration Testing with Windows Computer & Bypassing an Antivirus Using VEIL-Framework in Kali Linux

Pentesters have a hard time bypassing anti-viruses nowadays Since  Antiviruses are evolving as we speak. We at GBHackers decided to put…

2 years ago

Pentesting Windows Using Microsoft Office DDE Exploit (MACROLESS)

DDE exploit also known as dynamic data exchange, allows data to be transferred between applications without any interaction from the…

2 years ago