Operating Systems
-
September 27, 2020
How To Retrieve & Decrypt Stored Passwords in Firefox & Chrome Remotely
Retrieving stored passwords in web browsers like Mozilla Firefox and Google Chrome is a part of the post-exploitation methodology. Attackers…
Read More » -
February 8, 2018
The 10 Best Linux Desktop Environments in 2018
Linux is a family of free and open-source software operating systems built around the Linux kernel. Typically, Linux is packaged…
Read More » -
January 7, 2018
How To Use Google Chrome Browser to SSH into Remote Devices
This Google Chrome Browser Secure Shell Chrome Application provides PuTTy-like functionality. This application is stand-along SSH client for Chrome and…
Read More » -
October 22, 2017
10+ Google Chrome Extension For Penetration Testers
The BuiltWith Chrome Extension lets you find out what a website is built with by a simple click on the…
Read More » -
October 16, 2017
ACLight: An Advanced Privileged Account Discovery Tool
ACLight is a tool which is used for discovering privileged accounts through advanced ACLs analysis. It also includes the Shadow…
Read More » -
July 19, 2017
Embedded Payload with Image – Undetectable Backdoor
Welcome to Hack Today, Let’s start by Embedding Undetectable Payload with an Image. A tool which is design for attackers…
Read More » -
July 9, 2017
Get A Reverse Shell By Targeting Exploit in Internet Explorer
Get a reverse shell by Targeting Exploit in Internet Explorer. There’s tons of vulnerabilities to exploit internet explorer and get…
Read More » -
June 2, 2017
EvilOSX: A Remote Administration Tool (RAT) for macOS / OS X
EvilOSX: A pure python, post-exploitation, remote administration tool (RAT) for macOS / OS X. The EvilOSX can be used to…
Read More » -
May 3, 2017
Get a Reverse Shell in Seconds using USB Rubber Ducky & Arduino BadUSB
Today We’re going to setup a reverse shell in USB Rubber Ducky and Arduino BadUSB. And using netcat for a reverse…
Read More » -
January 16, 2017
Find Your Open Ports in Order to Close Them in Windows/Mac/Linux
In this tutorial, we’re going to teach you how to keep your windows operating system secure. This method can be…
Read More » -
November 15, 2016
Hack Windows 10 Password on Computer with Secure Boot
Hack Windows 10 Password: To bypass this you need to remove your hard drive and connect it to another computer.…
Read More » -
October 15, 2016
Touchpad issues – tapping, reverse/natural scrolling; Kali Linux
I have often encountered problems with touchpad in Kali Linux. This problem could be either on tapping (tapping the touchpad)…
Read More »