Tag Archives: pentesting
Exploits – Advisories

Offensive Security’s Exploit Database Archive The Exploit Database – ultimate archive of Exploits, Shellcode, and Security Papers. Packet Storm Security…

OSINT – Website files metadata
OSINT – Part 3

Information gathering types Passive During passive information gathering you should never send any type of traffic directly to the target….

OSINT – Github Dorks

Github search is quite powerful and useful feature and can be used to search sensitive data on the repositories. Collection…

OSINT – Part 2

Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term “open” refers to…

OSINT – Part 1

Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term “open” refers to…

Install latest Wireshark on Debian

Add backports to your sources.list For jessie add this line: deb http://ftp.debian.org/debian jessie-backports maindeb http://ftp.debian.org/debian jessie-backports main to your sources.list…

VLAN hopping

VLAN hopping VLAN hopping is a computer security exploit, a method of attacking networked resources on a virtual LAN. The…

Simple Background HTTPS Reverse Meterpreter

Meterpreter is an advanced, dynamically extensible payload that uses in-memory DLL injection stagers and is extended over the network at…

Email addresses harvester

EmailHarvester is a tool to retrieve Domain email addresses from Search Engines. This project was inspired by: * theHarvester(https://github.com/laramies/theHarvester) from…

Next Page