This video shows how to manually import exploits to the Metasploit framework, as an example we’ll import the apple mac os x feedback assistant race condition privilege escalation exploit CVE: 2019-8565, so the main aim here is to teach you …
Recently a Facebook announced that their popular messaging application Whatsapp has been vulnerable to a remote code execution for quite sometime now (CVE-2019-3568) , you should immediately update yours if you have it installed to 2.19.34 if you have an …
As we know WPA2 has been the latest and greatest in terms of WiFi security for a long time now, you might have also already heard about WPA3 and how its going to replace WPA2 as its more secure. Now …
Hello everyone, this is my talk in the Global Cyber Security Financial Summit (GCSFS) titled “You Spent All That Money And Still Got Hacked”, as the title suggests this shows how hackers gain access to secure systems, I know there …
zLogger is a Remote persistent keylogger it is written in python, and can generate executables that run on Windows and Linux, once executed on a system it’ll run the background, record every key-strike and report to the email specified when …
One of the best chipsets that support monitor mode and packet injection for both 5Ghz and 2.4 Ghz frequencies is the RealTek RTL8812AU, this makes adapters with chipset ideal for hacking, the only problem is this chipset is not natively …