Skip to content
02 Feb, 2023
Latest Exploits, Tools News
Userefuzz – User-Agent , X-Forwarded-For & Referer SQLI Fuzzer Made With Python
Wardriving WIFI & Cellular Networks On Android Using WiGLE
Shells – A Script For Generating Common Revshells Fast & Easy
Mubeng – Incredibly Fast Proxy Checker & IP Rotator With Ease
TruffleHog – Find Leaked Credentials In GitHub, GitLab, Filesystems, S3, & Circle CI

SkyNet Tools

The Latest Infosec News, Tools, and Exploits – Got Root?

  • Home
  • Home
  • Articles
  • Exploits
  • News
  • Tools
  • Tutorials
  • Home
  • linux

Tag: linux

RecoverPy – Recover Overwritten or Deleted Data.

January 16, 2022January 16, 2022 Admin
recoverpy

You can already find plenty of solutions to recover deleted files, but it can be a hassle to recover overwritten files. RecoverPy searches through every block of your partition to find your request. Demo Installation […]

Leave a commentToolslinux, python

Platypus – Modern Multiple Reverse Shell Sessions/Clients Manager Via Terminal Written in Go

January 10, 2022January 10, 2022 Admin
Platypus

Features Multiple service listening port Multiple client connections RESTful API Python SDK Reverse shell as a service (Pop a reverse shell in multiple languages without remembering idle commands) Download/Upload file with progress bar Full interactive […]

Leave a commentToolslinux

Traitor – Automatically Exploit Low-Hanging Fruit For A Root Shell. Linux Privilege Escalation Made Easy

June 21, 2021June 21, 2021 Admin
Traitor

Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities (including most of GTFOBins) in order to pop a root shell. It’ll exploit most sudo privileges listed in GTFOBins to pop a […]

Leave a commentToolslinux

ArchStrike An Arch Linux Repository for Security Professionals and Enthusiasts.

November 30, 2020November 30, 2020 Admin
archstrike

Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7, and ARMv8. Our website Our Twitter ArchStrike is a penetration testing and security repository for users of Arch Linux, following Arch Linux standards to […]

Toolslinux

SUDO_KILLER Gain Root Using Privilege Escalation Various Methods

November 10, 2020November 10, 2020 Admin
sudo killer

#sudo exploitation #Abusing sudo #Exploiting Sudo #Linux Privilege Escalation #OSCP Linux Privilege Escalation through SUDO abuse INTRO **WARNING: SUDO_KILLER is part of the KILLER project. SUDO_KILLER is still under development and there might be some […]

Toolslinux

Linux Evil Toolkit – Framework that aims to centralize, standardized simplify the use of various security tools

November 9, 2020November 9, 2020 Admin
Linux Evil Toolkit

considerations Usage NOTE: When you start a pentest, type the INIT command and define the target, or write values in linux-evil-toolkit/config/letk.rb Basics simple_scan options DeepLink Backend Functions From engine module From Visual module From Interpreter […]

Toolslinux

What is Phishing? | Learn Phishing Using Kali Linux | Phishing Attack Explained

November 9, 2020December 3, 2020 Admin
Tutorialsethical hacking, hacking, kali, linux

Installing DVWA | How to Install and Setup Damn Vulnerable Web Application in Kali Linux

November 9, 2020December 3, 2020 Admin
Tutorialsethical hacking, hacking, kali, linux, web

Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux Tutorial

November 9, 2020December 3, 2020 Admin
Tutorialshacking, kali, linux, tutorial

Kali Linux vs ParrotOS | Which One You Should Learn?

November 9, 2020December 3, 2020 Admin
Tutorialshacking, kali, linux

Posts navigation

1 2 … 10 Next

Latest Tools

Tags

bruteforce (17) csrf (20) cyber security (17) dns (19) enumeration (24) ethical hacking (31) exploit (103) framework (27) hacked (17) hacker exploit (59) hacking (126) information gathering (18) infosec (33) injection (24) kali (40) kali linux (59) linux (96) linux commands (20) linux tutorial (21) malware (17) metasploit (22) network (22) news (22) nmap (28) OSINT (18) passwords (17) Penetration (28) pentesting (50) python (64) rce (32) recon (16) remote code execution (20) scanner (41) Scanning (16) security (22) sqli (30) ssh (20) tools (89) tutorial (198) Walkthrough (31) web (34) wifi (45) windows (22) wordpress (22) xss (30)
Check up status of websites with DownForJust.Medownforjust.me

Latest News

ftx

FTX Hacked Hours After Filing For Bankruptcy

  • 12 Nov 2022

On Saturday, FTX CEO John Ray confirmed via Twitter that FTX and FTX US were hacked. Ironically this attack happened...

hacked

Puget Sound Educational Service District Says King and Pierce County Schools Hacked

  • 14 Jan 2021

On January 12th 2021 Puget Sound Educational Service District released a statement saying their networks were hacked. According to their...

ticketmaster

Ticketmaster To Pay $10 Million in Fines After Hacking Competitor.

  • 4 Jan 2021

According the Department of Justice in the United States Ticketmaster, the ticket sales company, is ordered to pay $10 million...

spotify

Spotify Suffers Breach of User Information

  • 24 Nov 2020

A large number of Spotify users have already been urged to examine their protection safety carrying out a main cyber...

Copyright SkyNetTools© All rights reserved
Magazine Plus by WEN Themes
RSS
Follow by Email
Facebook
Facebook
fb-share-icon
Twitter
Visit Us
Follow Me
Tweet