Assume that you want to transfer data from one machine to another machine. If you use public email services, FTP or …
Bypass an Anti Virus Detection with Encrypted Payloads using VENOM Tool
Nowadays many Malware and Payloads are using Encryption techniques and packing techniques using Packers to Evade the Anti Virus Software …
Cisco Global Exploiter & CAT -Auditing & Exploit 14 Vulnerabilities in Cisco Switches and Routers
Cisco Global Exploiter (CGE) Cisco Global Exploiter (CGE), is an advanced, simple and fast security testing tool / exploit engine, …
Netcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machine
Netcat is a well build network debugging tool, which can read and write data across computers using TCP or UDP, …
Commix – Automated All-in-One OS Command Injection and Exploitation Tool
Commix (short for [comm]and [i]njection e[x]ploiter) has a simple environment and it can be used, from web developers, penetration testers …
EgressBuster – Compromise Victim via Command & Control using Firewall
Network Firewalls acts as a fortification to keep the internal corporate network secure.Many people often think as it is protecting …