Shellphish: A Phishing Tool

Shellphish is an interesting tool that we came across that

Beginner’s Guide to Nexpose

In this article, we’ll learn about Nexpose, which is used

Penetration Testing on Splunk

In this article, we are going to exploit SPLUNK using

Evilginx2- Advanced Phishing Attack Framework

This is the successor of Evilginx 1, and it stays

Web Server Lab Setup for Penetration Testing

In this post, we will discuss how to set-up our

Beginner’s Guide to Nessus

In this article, we will learn about Nessus which is

Kage: Graphical User Interface for Metasploit

Kage is a GUI for Metasploit RCP servers. It is

Comprehensive Guide on Netcat

This article will provide you with the basic guide of

Eyewitness – Open Source Target Visualization and Recon Tool

Got a huge list of targets that you’d like to

Command & Control Tool: Pupy

In this article, we will learn to exploit Windows, Linux

Multiple Ways to Exploiting OSX using PowerShell Empire

In this article, we will learn multiple ways to how

Command and Control Guide to Merlin

In this article, we learn how to use Merlin C2

nps_payload: An Application Whitelisting Bypass Tool

In this article, we will create payloads using a tool

Hiding IP During Pentest using PowerShell Empire (http_hop)

This is our fourth article in empire series, in this

Post Exploitation on Saved Password with LaZagne

This article will be focused on The LaZagne project and

Comprehensive Guide on Snort (Part 1)

This article will introduce a guide to understand IDS using

Penetration Testing on Memcached Server

In our previous article, we learned how to configure Memcached

Bypass Application Whitelisting using cmstp

By default, Applocker allows the executing of binaries in the

Pentest Lab Setup on Memcached

In this article, we are going to learn about pen-testing

Multiple Ways to Exploiting Windows PC using PowerShell Empire

This is our second post in the article series ‘PowerShell

Jenkins Pentest Lab Setup

Hey!You all know that we have performed so many CTF

Exploiting Windows using Contact File HTML Injection/RCE

After the 0 day exploit on malicious VCF file in

Exploiting Windows PC using Malicious Contact VCF file

A huge shoutout to cyber security researcher John Page for

GreatSct – An Application Whitelist Bypass Tool

While writing Applocker bypass series, we found a new tool

Bypass Application Whitelisting using rundll32.exe (Multiple Methods)

This purpose to write this post is to demonstrate the

Bypass Application Whitelisting using regsrv32.exe (Multiple Methods)

This purpose to write this post is to demonstrate the

Bypass Application Whitelisting using wmic.exe (Multiple Methods)

This purpose to write this post is to demonstrate the

Bypass Application Whitelisting using msbuild.exe (Multiple Methods)

This purpose to write this post is to demonstrate the

Bypass Application Whitelisting using mshta.exe (Multiple Methods)

Today we are going to learn about different methods of

Bypass Application Whitelisting using msiexec.exe (Multiple Methods)

In our previous article, we had discussed on “Windows Applocker