In this post, we will demonstrate how to set-up our own Vulnerable PostgreSQL for penetration testing on Ubuntu 20.04 and How to conduct PostgreSQL penetrationRead more
CWFF is a tool that creates a special High quality fuzzing/content discovery wordlist for you at the highest speed possible using concurrency and it’s heavilyRead more
Metasploit Tutorial Auxiliary module Metasploit is known for its free, open-source exploits – modules that pop shells. But in reality, penetration testers rely more onRead more
As we all know, now that we live in the world of Virtualization, most of the organizations are completely reliable on virtual services to fulfilRead more
Quiver is the tool to manage all of your tools. It’s an opinionated and curated collection of commands, notes and scripts for bug bounty huntingRead more
Apple, the company claimed that its device is more secure than others. Now Apple is ready to move forward, they are providing iPhone to securityRead more
Vagrant VirtualBox Environment For Conducting An Internal Network Penetration Test. 1. Capsulecorp PentestThe Capsulecorp Pentest is a small virtual network managed by vagrant and ansible.Read more
ScanT3r – A Web Security Scanner To Detect following vulnerabilities. Remote Code Execution XSS Reflected Template Injection Jinja2 ERB Java Twig Freemarker SQl Injection OS SupportRead more
Super Simple Python Word List Generator for Password Cracking (Hashcat)!I know what your are thinking. Why create another word list generator? Well, I needed somethingRead more
Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order to quickly perform recon tasks,Read more
In this post, we are going to discuss how we can connect to Victims machine remotely using Python libraries “Impacket” which you can download fromRead more
ADS goes here!If you don't see it, then please turn OFF
AD blocker for this website.
Our ads are not aggressive and help us
pay for the server and coffee.
THANK YOU for your support!