DDE exploit

Pentesting Windows Using Microsoft Office DDE Exploit (MACROLESS)

DDE exploit also was known as dynamic data exchange, it allows data to be transferred between applications without any interaction from the...

RouterSploit – Exploitation Framework for Embedded devices

The RouterSploit Framework is an open-source exploitation framework devoted to embedded devices. It includes various modules that aid penetration testing operations:
DNS Shell

DNS Shell – Tool to Compromise and Maintain Control Over Victim Machine

DNS protocol runs on the application layer of the TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution)...
JSRAT – Secret Command & Control Channel Backdoor to Control Victims Machine Using JavaScript

JSRAT – Secret Command & Control Channel Backdoor to Control Victims Machine Using JavaScript

JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the server and...
transfer data

How to Transfer Data via Monitor Pixel Color Values (Monitor Screen as Covert Channel)

Assume that you want to transfer data from one machine to another machine. If you use public email services, FTP or any other...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security