Unicornscan – Port Scanning

What is Unicornscan? Unicornscan is a new information gathering and correlation engine built for and by members of the security research and testing communities. It was designed to provide an engine that is Scalable, Accurate, Flexible, and Efficient. You may be wondering, why not use NMAP?? Well, Nmap is not very

Kalitorify – Transparent Proxy Through Tor

Kalitorify - Transparent Proxy Through Tor What is Kalitorify? Kalitorify is a shell script for Kali Linux which use iptables settings for transparent proxy through Tor, the program also allows you to perform various checks like checking the external IP, or if Tor has been configured correctly. What is a Transparent Proxy? Also known

The Complete Phishing Guide – Ngrok & Cuteit

The Complete Phishing Guide - Ngrok & Cuteit What’s social engineering? Social engineering is the psychological manipulation of people into performing actions or divulging confidential information! Such as phishing attacks, which we will cover today. What do we need? We just need 3 things!   Cuteit: https://github.com/D4Vinci/Cuteit - This is a malicious IP obfuscator! Sounds scary

DotDotPwn – Directory Traversal Fuzzing

What's DotDotPwn? DotDotPwn is essentially a Directory Traversal fuzzer that allows you to identify directory traversal vulnerabilities on various services. These services range from web servers (HTTP, HTTP URLs, FTP and TFTP Protocols!) Cool huh?   What's Fuzzing? Fuzzing testing is essentially a quality assurance technique used to discover coding errors and security

Simple Stack Overflow

What is a Stack Overflow? A stack overflow takes place if the call stack pointer exceeds the stack bound! In other words, it’s due to excessive memory usage. What do you need? Immunity debugger Dev C++ or CodeBlocks What do you need to do? To start off, fire up Dev C++!   Code used to

Immunity Debugger Basics

To start off, for all my HackerSploit fans out there, I’d like to take this chance to thank you for 200,000 subscribers. I will keep on with my promise, and always provide you with top quality videos. Today, we will look at the Immunity Debugger! Setting up your debugger on Windows It

Setting Up The Exploit Development Lab

The first step is setting up a target for our practice, for this series we will be using kali linux as attacker box and Linux as a victim, it is just to tell you how to set this up, in future, we will use a Windows virtual machine as our

Generating Shellcode with msfvenom

Msfvenom is a combination of msfpayload and msfencode, putting both of these tools into a single Framework instance. What is a shellcode? In hacking, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control the

Top