Thursday, February 21, 2019
how to create persistent backdoor for android in metasploit

How to Create a Persistent Android Backdoor for Metasploit with Shell Script

Warning : This tutorial is for educational purposes only. Neither the author, nor the website is responsible for what the visitor does with the...

How to bind an Image with APK file

Creating an malicious payload APK is just a piece of cake for penetration testers. The real process lies in hiding the payload Apk either...

How Drupal Website users can be Hacked with Drupal dagger (Zero Day Dork)

Drupal Dagger is a dork discovered by my Team Mate Mohan Of TPH Infosec. During his recon, Mohan discovered this dork which let him...
drupalgeddon2 flaw on drupal

Drupalgeddon2 Exploit Tutorial

Drupalgeddon2 the hackening is an update rolled to all Drupal users to address one of the major flaw found in Drupal few days back. Thesecurity...

How to Inject Coinhive Miner into WiFi Network users using Bettercap

Coinhive is a most popular crypto network that offers it's users to mine just with javascript. Users can insert this javascript wherever they want...
burp mitm ssl intercept

How to Perform MITM Attack using Burpsuite to Intercept SSL Credentials

Burpsuite is undeniably one of the best web application penetration testing tools available today. The tool has been built in java and comes with...
SSLstrip

How to Sniff HTTPS Traffic Username and Passwords (SSL Stripping)

SSL Stripping is the most used technique for hacking traffic from HTTPS website. SSL strip was found on 2009 in black hat conference and...
Kali Linux 2018.3 Download

Kali Linux 2018.3 Download

"Linux" the term infers to the common people as a free and open source software but the view of penetration testers towards...

How to Capture HTTPS Traffic in Android

Network penetration testing is essential for maintaining our network secure from Intruders. Linux possess few pentesting tools for testing our network security. Since Android...

How to Use Cloud Linux For Free

This article will comes up with the tutorial on how to use kali linux on cloud for free and unlimited. In this pentesting era...

Stay connected

0FansLike
1FollowersFollow
179FollowersFollow

Latest article

Coship Router Unauthenticated Admin Password Reset CVE-2019-6441

Nearly all the firmware versions of Coship routers are vulnerable for this attack. The vulnerability lies in the apply.cgi file of the...

A New Dream Theory With Parallel Universe

I will go with the term ----“ According to me”, the dream is a dimension where we are not the mere projection of ourselves....

Elon Musk walked out of Tesla!

The Tesla's board of directors announce Robyn Denholm as the new Chair of the Tesla board, effective immediately. Tesla announced on Wednesday night that Australian telecom executive...