How to Encrypt Drive of Remote Victim PC
First Hack the Victim PC Using Metaspolit (Tutorial How to Hack Remote PC) Once you got the meterpreter session use ‘shell‘command to get command prompt of the target. Type manage-bde -status and...
View ArticleCutyCapt – A Qt WebKit Web Page Rendering Capture Utility
CutyCapt is a small cross-platform command-line utility to capture WebKit’s rendering of a web page into a variety of vector and bitmap formats, including SVG, PDF, PS, PNG, JPEG, TIFF, GIF, and BMP...
View ArticleHack Windows PC using AudioCoder .M3U Buffer Overflow
This module exploits a buffer overflow in Audio Code 0.8.18. The vulnerability occurs when adding an .m3u, allowing arbitrary code execution with the privileges of the user running AudioCoder. This...
View ArticleVeil – A Metasploit Payload Generator to Bypass Antivirus
Veil is a tool designed to generate metasploit payloads that bypass common anti-virus solutions. First Download viel from here and unzip file and save in your desktop Run setup script on Kali x86...
View ArticleHow to Install Simple-Ducky Payload Generator
The simple-ducky is designed to quickly create reliable payloads and launch listener’s.The Simple-Ducky currently uses version 2.6 of the duck encoder. The lastest version of the Simple-Ducky supports...
View ArticleHack Remote PC using Sun Java Web Start Double Quote Injection
This module exploits a flaw in the Web Start component of the Sun Java Runtime Environment. Parameters initial-heap-size and max-heap-size in a JNLP file can contain a double quote which is not...
View ArticleSwaparoo: Meterpreter Script to Backdoor Windows
Swaparoo Windows backdoor method for Windows Vista/7/8. This code sneaks a backdoor command shell in place of Sticky Keys prompt or Utilman assistant at login screen. First Download Swaparoo from here...
View ArticleExploit Windows, Linux or MAC PC using Java Applet Driver Manager Privileged...
This module abuses the java.sql.DriverManager class where the toString() method is called over user supplied classes from a doPrivileged block. The vulnerability affects Java version 7u17 and earlier....
View ArticleHack Windows PC using Novell Client 4.91 SP4 nwfs.sys Local Privilege Escalation
This module exploits a flaw in the nwfs.sys driver to overwrite data in kernel space. The corruption occurs while handling ioctl requests with code 0x1438BB, where a 0×00000009 dword is written to an...
View ArticleHack Windows, Linux or MAC PC using Java Applet Provider Skeleton Insecure...
This module abuses the insecure invoke () method of the Provider Skeleton class that allows to call arbitrary static methods with user supplied arguments. The vulnerability affects Java version 7u21...
View ArticleHack Remote Windows PC using ABBS Audio Media Player .LST Buffer Overflow
This module exploits a buffer overflow in ABBS Audio Media Player. The vulnerability occurs when adding an .lst, allowing arbitrary code execution with the privileges of the user running the...
View ArticleHack Gmail Password using Hydra in kali Linux
Open your Kali Linux terminal and Type xhydra and press enter You can also do this manually. First Open Your Kali Linux and Follow this path Kali Linux->Passwords Attacks->Online...
View ArticleHack Windows 7 PC Remotely using ERS Viewer 2013 ERS File Handling Buffer...
This module exploits a buffer overflow vulnerability found in ERS Viewer 2013. The vulnerability exists in the module ermapper_u.dll, where the function rf_report_error handles user provided data in a...
View ArticleHack Windows 7 PC Remotely using MediaCoder .M3U Buffer Overflow
This module exploits a buffer overflow in MediaCoder 0.8.22. The vulnerability occurs when adding an .m3u, allowing arbitrary code execution under the context of the user. DEP bypass via ROP is...
View ArticleExploit Remote Windows PC using Corel PDF Fusion Stack Buffer Overflow
This module exploits stack-based buffer overflow vulnerability in version 1.11 of Corel PDF Fusion. The vulnerability exists while handling a XPS file with long entry names. In order for the payload to...
View ArticleHack Remote Windows PC using Apple Quicktime 7 Invalid Atom Length Buffer...
This module exploits a stack buffer overflow in Cyber Link Power2Go version 8.x the vulnerability is triggered when opening a malformed p2g file containing an overly long string in the ‘name’ attribute...
View ArticleBypass Antivirus and Hack Remote Windows PC with Syringe
First Download syringe-antivirus-bypass from Here Now untar the file tar xvf syringe.tar Now you can start it with ./syringe.sh After we successfully generate the malicious exe File, it will stored on...
View ArticleXSSF Cross-Site Scripting Framework in Metasploit (Part 1)
The Cross-Site Scripting Framework (XSSF) is a security tool designed to turn the XSS vulnerability exploitation task into a much easier work. The XSSF project aims to demonstrate the real dangers of...
View ArticleHack Remote Windows 7 PC using Chasys Draw IES Buffer Overflow
This module exploits a buffer overflow vulnerability found in Chasys Draw IES (version 4.10.01). The vulnerability exists in the module flt_BMP.dll, whileparsing BMP files, where the ReadFile function...
View ArticleHack FTP Remotely using Open-FTPD 1.2 Arbitrary File Upload
This module exploits multiple vulnerabilities found in Open Compact FTP server. The software contains authentication bypass vulnerability and a arbitrary file upload vulnerability that allows a remote...
View Article