OS X has a reputation of being very secure, and most people that use it think it is un-hackable, in my opinion it is more secure than Windows but it is not un-hackable, the following video shows how to to …
Most of us have heard of msfvenom or or at least metasploit backdoors, they’re great but they get detected by anti-virus programs, we also know we can use a tool called Veil-Evasion to generate backdoors that bypass most anti-virus programs, …
Ninja KeyLogger and Analysis Console Synopsis: This KeyLogger was written as a passive penetration testing tool as a ‘plug and forget payload’. It is used essentially to spy on compromised machines as a part of Post Exploitation attacks. It can also …
Two days ago the newest version of Kali 2018.1 was released, as usual this brought a bunch of update, upgrades, patches and bug fixes. One of the major components that got updated in this release is the kernel, Kali 2018.1 …
One of the most common questions that I get in my courses if not the most common questions is “I imported virtual box image, started the machine and got a blank black screen”, this is basically just a black screen …
Hello, today I’m gonna share my knowledge about how to gather information of a website before you attack it or discover any vulnerabilities. Commonly, hackers they call this phase as Reconnaissance. Which means you are going to collect useful information …