How to Hack Using JavaScript (XSS, Brute Force, BeEF)
Similar to Metasploit, BeEF is a framework for launching attacks. Unlike Metasploit, it is specific to launching attacks against web...
Hack windows 7 by using Armitage and Ettercap DNS_Spoofing
#armitage #spoofing #hacking #exploit
Uber Hack Challenge
Last year we launched a private, beta bug bounty program for over 200 security researchers. They found nearly 100 bugs — all of which...
10 Best Android Hacking Apps
In this post we write about download best android hacking apps for your android smart phones. Now days you see pc and mobile distance is...
STUXNET: The Virus that Almost Started WW3
Stuxnet is a malicious computer worm believed to be a jointly built American-Israeli cyber weapon. Although neither state has confirmed...
Creating a Backdoor Using Meterpreter
So, Let’s Start; You can either start the Metasploit framework from the Applications menu or from the command line. To launch Metasploit...
Finding a Zero-Day Exploit
Zero-days are found in exactly the same ways as any other kind of hole. What makes a security hole a "zero day" relies exclusively on who...
Client Side Exploits in Metasploit
As we have already discussed, Metasploit has many uses and another one we will discuss here is client side exploits. To show the power of...
Custom Reverse Shell Backdoor for WIN/LIN/MAC
Python in penetration testing and you may use or tune the code for a real world case. Plus you will be aware of the effectiveness of...
Java Malware Exploits & Vulnerability
A security researcher walked through some of the methods used by Flashback malware to highlight the different types of Java...