Hello friends!! Several times you might have read our articles on CTF challenges and other, where we have used searchsploit to find out an exploit
Hey Friends! Did you know that meterpreter is known as Hacker’s Swiss Army Knife!! Well! Now you do. Meterpreter, a highly developed payload that can
Introduction Web directory enumeration remains one of the most valuable reconnaissance techniques in a penetration tester’s arsenal. By discovering hidden files, backup paths, administrative panels,
Magic Unicorn is a simple tool for using a PowerShell downgrade attack that injects shellcode straight into memory. It is based on Matthew Graeber’s PowerShell
In this article, we are focusing on the transient directory using Kali Linux tool DIRB and trying to find hidden files and directories within a
Today we are going to solve another CTF challenge “DevOops”. DevOops is a retired vulnerable lab presented by Hack the Box for helping pentester’s to
Today’s article is the first post of our Empire series. In this, we will cover every basic you need to know about the PowerShell Empire
Every business organization seeks safety and security of its internal information. It is essential to ensure that the data is protected from malicious attackers who
Hi Friends, today’s article is related to exploiting the HTTP PUT method vulnerability through various techniques. Firstly, we will check whether the target victim machine