Hello friends, today in this article we are going to familiarize you with one of the most vital tools of kali that everybody needs in
In this article, we’ll learn about Steghide. There are various steganography tools available but the part that differentiates it is that it uses a variety
In this article, we’ll discover various methods to read, write and manipulate the meta-data information recorded in a variety of file types. In order to
In this article, we will learn to use EvilOSX tool which is a Remote Administrator tool (RAT ) for initializing foothold on MacOS/OSX like platform.
In this article, we will learn how to use retina, “a vulnerability scanner” to our best of advantage. There are various network vulnerability scanners, but
Shellphish is an interesting tool that we came across that illustrates just how easy and powerful phishing tools have become today. The tool leverages some
In this article, we’ll learn about Nexpose, which is used to scan a vulnerability network. There are various vulnerability scanners but the part that keeps
In this article, we are going to exploit SPLUNK using the reverse shell. One can find this beneficial in exploiting and do penetration testing of
This is the successor of Evilginx 1, and it stays in-line with the MITM lineage. This tool is designed for a Phishing attack to capture