Browsing the "Penetration Testing" Tag

Dual Boot Kali Linux 2020.1b Install in Windows 10 (1909 lastest) | Simple Steps | OS Installation

May 2nd, 2020 📆 | 5743 Views ⚑

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing.It is maintained and funded by Offensive

Tagged with:




Military cybersecurity jobs, offensive security and CTFs | Cyber Work Podcast

April 13th, 2020 📆 | 6182 Views ⚑

Explore the world of military cybersecurity careers, capture-the-flag (CTF) competitions and offensive security with Ken Jenkins, CTO of By Light’s

Tagged with:




Metasploit Termux || Update Version Metasploit Framework || Top Hacking apps|| Fix all Error

April 4th, 2020 📆 | 1566 Views ⚑

Hello guys, today i will show how to install update version metasploit framework in termux. source

Tagged with:







Hack The Box – Hacking Optimum

April 3rd, 2020 📆 | 3333 Views ⚑

For those who are starting in the cyber security area, the Hack The Box is an online platform that allows

Tagged with:







Penetration Testing Demo: Brute Force Dictionary Attack Using Hydra and RSMangler

March 14th, 2020 📆 | 8130 Views ⚑

In this video we will demonstrate how to use Hydra and RSMangler to launch a brute force attack on a

Tagged with:










How to install Kali Linux 2020.1 on VMware + FREE Lifetime Keys

March 7th, 2020 📆 | 3627 Views ⚑

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by

Tagged with:




Hacking Cloud – 1(AWS) A(manual cloudgoat scenarios)

March 2nd, 2020 📆 | 5722 Views ⚑

Hacking(Pen-testing) AWS deployments manually using awscli. AWS services in-scope are IAM, EC2, RDS, LAMBDA, Modified host header, Loadbalancer, codebuild, SSM

Tagged with:




Subfinder – A Subdomain Discovery Tool That Discovers Valid Subdomains For Websites

March 1st, 2020 📆 | 7227 Views ⚑

subfinder is a subdomain tool that discovers valid subdomains for websites by using passive online sources. It has a simple

Tagged with:




Extended-SSRF-Search – Smart SSRF Scanner Using Different Methods Like Parameter Brute Forcing In Post And Get…

February 29th, 2020 📆 | 6109 Views ⚑

This tool search for SSRF using predefined settings in different parts of a request (path, host, headers, post and get

Tagged with:




IoTGoat – A Deliberately Insecure Firmware Based On OpenWrt

February 29th, 2020 📆 | 4371 Views ⚑

The IoTGoat Project is a deliberately insecure based on OpenWrt. The project’s goal is to teach users about the most

Tagged with:




Dnssearch – A Subdomain Enumeration Tool

February 29th, 2020 📆 | 3602 Views ⚑

This software is a tool. dnssearch takes an input domain ( parameter ) and a wordlist ( parameter ), it

Tagged with:







get_Team_Pass – Get Teamviewer’s ID And Password From A Remote Computer In The LAN

February 29th, 2020 📆 | 4759 Views ⚑

Get teamviewer’s ID and password from a computer in the LAN This program gets teamviewer’s ID and password from a

Tagged with:




Wifi-Hacker – Shell Script For Attacking Wireless Connections Using Built-In Kali Tools

February 29th, 2020 📆 | 7148 Views ⚑

Shell Script For Attacking Connections Using Built-In Tools. Supports All Securities (WEP, WPS, WPA, WPA2)

Tagged with:




ABD – Course Materials For Advanced Binary Deobfuscation

February 29th, 2020 📆 | 4708 Views ⚑

This repository contains the course materials of Advanced Binary Deobfuscation at the Camp (GCC) Tokyo in 2020. Reverse engineering is

Tagged with:




Progress-Burp – Burp Suite Extension To Track Vulnerability Assessment Progress

February 29th, 2020 📆 | 2147 Views ⚑

Burp Suite extension to track progress. To persist items and path patterns JDBC driver is required. Please see the

Tagged with: