The HTA Attack method enables you to clone a site and perform PowerShell injection through HTA files, which you can use for Windows-based PowerShell exploitation
Mimikatz mimikatz is a tool to check Windows security. It’s now well known to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory. mimikatz can also
From Wikipedia Session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called session key—to gain unauthorized access to information or
Remote code execution vulnerability has been discovered in the official WInRAR SFX v5.21 software.The vulnerability allows remote attackers to unauthorized execute system specific code to
The goal of BDF is to patch executable binaries with user desired shellcode and continue normal execution of the prepatched state. First of all download
First of all, go to Kali Linux Home directory. Move to etc /ettercap directory. Now edit etter.dns File. Modify the contents of the etter.dns and
With MOBILedit Forensic, you can view, search, or retrieve all data from a phone with only a few clicks. Moreover, this data includes call history,
AccessData (AD) provides Mobile Phone Examiner Plus (MPE+), a powerful mobile device data review tool that users can utilize in the field as part of
Creating a New Case in OS Forensic First Download OS Forensic from here and install in your pc then open OS Forensic and click on Create Case button to create a new