This video shows the most common method that hackers rely on to hack wordpress websites. All of this is done on our lab, the zSecurity Comment CTF which can be accessed at the bottom of this page or from this …
Hey guys, In this video, I will cover how to use Metasploit exploits and how to generate Metasploit payloads. Resources: Official Metasploit website
Hey guys! The following video shows you how to configure Kali Linux to route traffic through the TOR network to improve your privacy and anonymity.
Hello everyone, In this video, I will be showing you guys how to find emails using theHarvester and discover tools, I will also be showing you how to install tools that don’t come installed with kali from Github.
Hello everyone, Hope you are doing great and are safe! In this video, I guide you on creating an exploit for FreeFloat FTP Server which is vulnerable to buffer overflow. We start out by fuzzing, in which we identify the …
Hello, In this video, I will introduce you to a reverse TCP payload called shadow shark! Resources: ShadowSharkReverseShell