Exploitation Tools

Commando VM 2.0 – A New Version of Offensive Pentesting VM Updated With Kali Linux & New Hacking Tools

Commando VM 2.0, a new version of Windows-based security distribution released for penetration testing community and red teamers with updated…

5 years ago

How to Transfer Data via Monitor Pixel Color Values (Monitor Screen as Covert Channel)

Assume that you want to transfer data from one machine to another machine. If you use public email services, FTP or…

6 years ago

New Variant of HawkEye Sold on Hacking Forums and Distributed via Excel and DOC Files

Threat actors advertised a new version of the information stealer malware kit HawkEye Reborn v9 that exfiltrates various information from…

6 years ago

Malicious Payload Evasion Techniques with Advanced Exploitation Frameworks

Sophisticated threats are Evolving with much more advanced capabilities and giving more pain for analysis even evade the advanced security…

6 years ago

Android Rat – TheFatRat Pentesting Tool to Hack and Gain Access to Targeted Android Phone

TheFatRat is a simple Android RAT tool to build a backdoor and post-exploitation attacks like browser attacks. This Android RAT…

6 years ago

Cisco Auditing Tool & Cisco Global Exploiter to Exploit 14 Vulnerabilities in Cisco Switches and Routers

Cisco Global Exploiter (CGE) Cisco Global Exploiter (CGE), is an advanced, simple and fast security testing tool / exploit engine,…

7 years ago

Turla Mosquito Hacking Group Exploiting Backdoor Using Metasploit To Compromise the Target System

Turla cyber espionage group leveraging Powerful Mosquito backdoor using open source exploitation framework Metasploit for an initial stage of the attack on…

7 years ago

APT Group Cyber Attack to Hack Various Companies Web Servers Using Advanced Hacking Tools

A Well known APT group called Energetic Bear/Crouching Yeti attacked various companies servers with a strong focus on energy and industrial sectors…

7 years ago

Linux Exploit Suggester – A Kali Linux Tool to Find the Linux OS Kernel Exploits

According to Kali Tool list, Linux Exploit Suggester provide just a simple script to keep track of vulnerabilities and suggest…

7 years ago

Turnoff Victims Internet Connectivity In LAN and Enjoy High Speed Internet

NetCut is a software which enables a network admin to turn off the internet connection of any machine in a…

7 years ago