Exploitation Tools

RouterSploit – Exploitation Framework for Embedded devices

The RouterSploit Framework is an open-source exploitation framework devoted to embedded devices. It includes various modules that aid penetration testing…

2 years ago

ICMP Shell- Secret Command and Control Channel to Control Victims Machine Using Ping

Corporate firewalls can block reverse and bind TCP connections. However, corporate firewalls are behind internal networks. So we can use PING…

2 years ago

XERXES – Penetration Testing with the Most Powerful Tool For DoS Attack using Kali Linux

In this Kali Linux Tutorial, we show you how to use Xerxes in launching a DOS attack. DDOS tools are…

2 years ago

Exploit Windows Remote PC with EternalBlue & DoublePulsar Exploit through Metasploit

EternalBlue Malware was Developed by National Security Agency (NSA) exploiting Windows-based Server Message Block (SMBv1) it is believed the tool…

2 years ago

VENOM – An Exploitation Tool to Bypass Anti Virus Detection with Encrypted Payloads

Nowadays many Malware and Payloads are using Encryption techniques and packing techniques using Packers to Evade the Anti Virus Software…

2 years ago

DDOS a Website Anonymously by Using Kali Linux Tools

DDOS tools are capable of putting heavy loads on HTTP servers and bringing them to their knees by exhausting their…

2 years ago

How to Launch a DoS Attack by using Metasploit Auxiliary

Most DDOS Attacks target Enterprise Networks so implementing DDoS Protection in Enterprise networks is a more important concern. An organization…

2 years ago

JSRAT – Secret Command & Control Channel Backdoor to Control Victims Machine Using JavaScript

JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the…

3 years ago

Checkm8 – Hacker Published “Unpatchable” Jailbreak for Millions of iOS Devices from iPhone 4S to iPhone X

An iOS security researcher with twitter handle Axi0mX released an Epic Jailbreaking tool dubbed Checkm8, exploit iOS device form iPhone…

5 years ago

4CAN – Cisco Released New Open Source Security Tool to Find Security Vulnerabilities in Modern Cars

Cisco released an open-source hardware tool called "4CAN" for automobile security researchers and car manufacturers to find the potential security…

5 years ago