Rubeus

A Detailed Guide on Rubeus

Introduction About Rubeus Rubeus is a C# toolkit designed to handle Kerberos interactions and breaches. It is well knowledge that Active Directories employ Kerberos, a ticket-based network authentication mechanism. Sadly, human mistake frequently results in AD configurations that do not prioritize security. In addition to creating keys and providing access with false certificates, Rubeus is…

Read More
websploit-wifi-jammer

Websploit Wifi Jammer

In this tutorial we will explore the Websploit Wifi Jammer module which we have edited to work with the latest version of Kali Linux. The Websploit Wifi Jammer module is a great tool to automatically disconnect every client connected to a targeted wireless network and access point. The WiFi jammer module also blocks new and…

Read More
android RAT WH-Cyberspace

WH-Cyberspace (Mr. Octopus) 🔞 Latest Android RAT Free Download

Usage of WH-Cyberspace Hacking Tool for attacking targets without prior mutual consent is illegal. It’s the end user’s responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational purposes. WH-Cyberspace (Mr. Octopus) 🔞 Latest…

Read More
Packet Sniffers

Best 5 Packet Sniffers for Bandwidth & Network Traffic Analysis

Packet sniffer  also known as network protocol analyzers, are tools that allow users to monitor and analyze network traffic. They can be used for a variety of purposes, including troubleshooting, performance monitoring, and security analysis. There are many different packet sniffers available, but the following five are considered to be among the best for bandwidth…

Read More
Digital Forensics

Digital Forensics, Part 1: Capturing a Forensically Sound Image

Digital Forensics, Part 1: Capturing a Forensically Sound Image Digital forensics is rapidly growing field of information security. The hacker needs to understand what evidence can be recovered and the security engineer needs to know how to find it. These skills are applicable to law enforcement, corporate investigations, network intrusions, malware analysis and incident response,…

Read More
Video Downloader Plus Chrome Extension Hijack Exploit

Video Downloader and Video Downloader Plus Chrome Extension Hijack Exploit – UXSS via CSP Bypass (~15.5 Million Affected)

Video Downloader Plus Chrome Extension Hijack Exploit Note: This post is going to be a bit different from the previous Chrome extension vulnerability writeups. I’m going to actually walk through the code along with you to show you how tracing through an extension generally works. For this reason the whole thing is a bit lengthy….

Read More
Metasploit CVE-2015-5122 Flash Exploit Tutorial

Metasploit CVE-2015-5122 Flash Exploit Tutorial

In this tutorial we will be importing the CVE-2015-5122 (Adobe Flash opaqueBackground Use After Free) zero day Flash Exploit module in Metasploit and have a vulnerable setup download the malicious Flash file. Recent versions of Adobe Flash Player contain critical vulnerabilities within the ActionScript 3 ByteArray, opaqueBackground and BitmapData classes. Exploiting one of these vulnerabilities could allow…

Read More
Websploit Cloudflare Resolver module

Websploit Cloudflare Resolver module

Websploit is an open-source tool for carrying out web-based attacks. It is a framework that can be used for various purposes, such as scanning, spoofing, and exploitation. One of the modules in Websploit is the Cloudflare Resolver module, which is designed to bypass Cloudflare’s security measures and reveal the true IP address of a website…

Read More