Category: Tutorials
Utopia Linux Post Exploitation Framework
About Utopia Framework Utopia Framework is a Linux post-exploitation framework that exploits Linux SSH vulnerability to provide a shell-like connection. Utopia Framework can be used to easily master Linux SSH exploitation. Getting started Utopia installation […]
StegCracker – Brute Force Utility to Uncover Hidden Data
Steganography brute-force utility to uncover hidden data inside files. Usage Using stegcracker is simple, pass a file to it as it’s first parameter and optionally pass the path to a wordlist of passwords to try […]
ReverseAPK
Credits: @xer0dayz Website: https://xerosecurity.com Version: 1.2 ABOUT: Quickly analyze and reverse engineer Android applications. FEATURES: -Displays all extracted files for easy reference -Automatically decompile APK files to Java and Smali format -Analyze AndroidManifest.xml for common […]
Nikto Cheat Sheet Infographic
Below is a helpful infographic for basic commands and usage with the tool Nikto You can download Nikto here: https://github.com/sullo/nikto
WiFiBroot – A WiFi Pentest Cracking tool for WPA/WPA2 (Handshake, PMKID, Offline Cracking, EAPOL)
WiFiBroot is built to provide clients all-in-one facility for cracking WiFi (WPA/WPA2) networks. It heavily depends on scapy, a well-featured packet manipulation library in Python. Almost every process within is dependent somehow on scapy layers […]
Avoiding DNS Leaks Within OpenVPN
How To Avoid DNS Leaks Within OpenVPN DNS leaks occur when DNS information is sent over insecure channels. This is usually the result of network configurations. Using sites such as the following you can check […]