Best of Post Exploitation Exploits & Tricks

Wifi Post Exploitation on Remote PC

Manual Post Exploitation on Windows PC (Network Command)

Post Exploitation Using WMIC (System Command)

Manual Post Exploitation on Windows PC (System Command)

Post Exploitation in Windows using dir Command

Post Exploitation for Remote Windows Password

Hack Legal Notice Caption of Remote PC

How to Delete Firewall Log in Remote PC using Metasploit

How to Enable and Monitor Firewall Log in Windows PC

Run OS Command against Multiple Session in Metasploit

Hack Admin Access of Remote Windows 10 PC using TpmInit UACBypass

Windows Firewall Post Exploitation with Netsh

Capture VNC Session of Remote Windows PC by Payloads Injection

How to Create unlimited Folder in Remote Victim PC using Metasploit

How to Access Unauthorized on Remote PC using Metasploit

How to Gather Information of Antivirus in Remote Victim PC using Metasploit

How to Hack Windows Wallpaper of Remote PC

How to Hack Saved sessions in Putty using Metasploit

Windows 7 Sticky Key Hack Attack using Metasploit

Hack the Password in Plain text of Remote Windows PC

How to find the usage of files in Remote victim PC (Remote PC Forensics)

How to Delete ALL Files in Remote Windows PC

Hack ALL Security Features in Remote Windows 7 PC

How to Change ALL Files Extension in Remote PC (Confuse File Extensions Attack)

Gather Cookies and History of Mozilla Firefox in Remote Windows, Linux or MAC PC

Hack Save Password in Mozilla Firefox in Remote Windows, Linux or MAC PC

How to Gather MUICache Entries in Remote Windows PC

How to Gather Skype Logs, Firefox History and Chrome history of Remote Victim PC

Forensics Investigation of Remote PC (Part 2)

How to Lock Drive of Remote Windows Victim PC

Shrink the Partition of Remote Victim PC

Remotely Scan Malware/Virus in Victim PC with Metasploit

How to Broadcast YouTube Video in Remote Windows System

Recover Deleted Data from Remote Victim PC

How to Encrypt Drive of Remote Victim PC

How to Gather Recent Files Dump of Remote PC

Hack netNTLM Credential using Microsoft Word UNC Path Injector

How to Lock/Unlock Folder in Remote Victim PC using Metasploit

How to Hide File in Remote Victim PC

Hack Remote Windows Password using Keylogger in Meterpreter

How to Enable Remote Desktop in Victim PC using Metasploit

How to Hack Hosts File of Remote Windows 7 PC (Host File Injection)

How to Delete Local User Account of Remote PC using Metasploit

Windows Gather Directory Permissions Enumeration

How to Gather Installed Application in Victim PC

How to Gather USB Drive History of Victim PC

How to Gather Microsoft Outlook Saved Password in Remote PC

How to Hack Save Password in FileZilla of Remote PC

How to Detect Install OS in Victim Virtual BOX

How to use Keylogger in Meterpreter

Best of Mozilla Firefox Hacking Exploits

Firefox XMLSerializer Use After Free

Mozilla Firefox Bootstrapped Addon Social Engineering Code Execution

Firefox 8/9 AttributeChildRemoved() Use-After-Free

Firefox 7/8 (<= 8.0.1) nsSVGValue Out-of-Bounds Access Vulnerability

Mozilla Firefox “nsTreeRange” Dangling Pointer Vulnerability

Mozilla Firefox Array.reduceRight() Integer Overflow

Mozilla Firefox Interleaved document.write/appendChild Memory Corruption

Best of JAVA Hacking Exploit

Java Applet Provider Skeleton Insecure Invoke Method

Java Applet Driver Manager Privileged toString() Remote Code Execution

Sun Java Web Start Double Quote Injection

Java Applet Reflection Type Confusion Remote Code Execution

Java CMM Remote Code Execution

Java Applet Method Handle Remote Code Execution

Java Applet AverageRangeStatisticImpl Remote Code Execution

Java Applet JMX Remote Code Execution

Java Applet JAX-WS Remote Code Execution

Java 7 Applet Remote Code Execution

Java Applet Field Bytecode Verifier Cache Remote Code Execution

Java Applet Rhino Script Engine Remote Code Execution

Sun Java Web Start BasicServiceImpl Code Execution

Sun Java Applet2ClassLoader Remote Code Execution

Sun Java Runtime New Plugin docbase Buffer Overflow

Java RMIConnectionImpl Deserialization Privilege Escalation

Java Statement.invoke() Trusted Method Chain Privilege Escalation

Java AtomicReferenceArray Type Violation Vulnerability

Sun Java Web Start Plugin Command Line Argument Injection

Java MixerSequencer Object GM_Song Structure Handling Vulnerability

Sun Java JRE AWT setDiffICM Buffer Overflow

Sun Java Calendar Deserialization Privilege Escalation

Java Signed Applet Social Engineering Code Execution

Sun Java Web Start Plugin Command Line Argument Injection

Best of Internet Explorer Exploit

MS12-063 Microsoft Internet Explorer execCommand Use-After-Free Vulnerability

MS12-043 Microsoft XML Core Services MSXML Uninitialized Memory Corruption

MS12-004 midiOutPlayNextPolyEvent Heap Overflow

MS12-020 Microsoft Remote Desktop Use-After-Free DoS

MS11-093 Microsoft Windows OLE Object File Handling Remote Code Execution

Internet Explorer CSS Recursive Import Use After Free

Windows Media Encoder 9 wmex.dll ActiveX Buffer Overflow

Internet Explorer COM CreateObject Code Execution

Internet Explorer WebViewFolderIcon setSlice() Overflow

Microsoft DirectShow (msvidctl.dll) MPEG-2 Memory Corruption

MS11-050 IE mshtml!CObjectElement Use After Free

Internet Explorer Daxctle.OCX KeyFrame Method Heap Buffer Overflow Vulnerability

Windows ANI LoadAniIcon() Chunk Size Stack Buffer Overflow (HTTP)

Internet Explorer createTextRange() Code Execution

Internet Explorer Winhlp32.exe MsgBox Code Execution

Internet Explorer CSS SetUserClip Memory Corruption

Internet Explorer 7 CFunctionPointer Uninitialized Memory Corruption

Microsoft Help Center XSS and Command Execution

Internet Explorer “Aurora” Memory Corruption

Internet Explorer DHTML Behaviors Use After Free

Microsoft Windows Shell LNK Code Execution

MS05-054 Microsoft Internet Explorer JavaScript OnLoad Handler Remote Code Execution