Run Kali Linux on Windows 10 – Download From Windows Store

Kali Linux - the most used penetration Linux Distro is now available on Windows 10 to run Natively, download via Windows store. Great news for...

[Download] Hacking Wireless Networks FOR DUMMIES

Download the Hacking Wireless Networks for Dummies. The ebook can be downloaded from the link provided of mediafire. - https://www.ethicalhackx.com/wp-content/uploads/Hacking20Wireless20Networks20FOR20DUMmIES20-20ethicalhackx.com_.pdf     DOWNLOAD EBOOK PDF The password for the file...

Kali Linux 2017.2 Release

We are happy to announce the release of Kali Linux 2017.2, available now for your downloading pleasure. This release is a roll-up of all updates and...

Debinject – Inject malicious code into *.debs

Inject malicious code into *.debs CLONE git clone https://github.com/UndeadSec/Debinject.git RUNNING cd Debinject python debinject.py If you have another version of Python: python2.7 debinject.py RUN ON TARGET SIDE chmod 755 default.deb dpkg -i backdoored.deb PREREQUISITES ...

Truehunter – Tool to detect TrueCrypt Containers

The goal of Truehunter is to detect TrueCrypt containers using a fast and memory efficient approach. It was designed as a PoC some time...

WPA-PSK Rainbow Tables Download

WPA as the encryption method for Access Points has greatly enhanced the security of wireless networks making it hard work to get into a...

Cobalt Strike : Penetration Testing on Intranet

Cobalt Strike : Introduction Cobalt Strike is software for Adversary Simulations and Red Team Operations. Adversary Simulations and Red Team Operations are security assessments that replicate...

Creating a Login Macro for Burp Suite

This is a step by step guide on how to make a simple login macro for Portswigger's Burp Suite. In the demo I will...

How To Decode Password Hash using CPU and GPU

Lets Learn To Decode Password Hash Using CPU & GPU to Plain Text Password hashing is used to store passwords in a secure manner for...

Reverse Shell Cheat Sheet

During penetration testing if you’re lucky enough to find a remote command execution vulnerability, you’ll more often than not want to connect back to...
27,389FansLike
143FollowersFollow
2,030FollowersFollow
315SubscribersSubscribe
error: Share The Link - www.ethicalhackx.com