Wifi password hacking: Easily Hack WiFi Password Using New WPA/WPA2 flaw

Learn how to hack Wi-Fi password of modern routers Wifi password hacking  has become popular as people are always in search of the free i...

BySensei Fedon

Wifi password hacking: Easily Hack WiFi Password Using New WPA/WPA2 flaw

Learn how to hack Wi-Fi password of modern routers Wifi password hacking has become popular as people are always in search of the free internet. But due to the advancement of technology, cracking passwords have become a difficult task to do. The reason is...Read More

CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests

Disclamer: this article & project is for academic purposes only. Some weeks ago I read about this Starbucks case where hackers hijack...

BySensei Fedon

CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests

Disclamer: this article & project is for academic purposes only. Some weeks ago I read about this Starbucks case where hackers hijacked laptops on the WiFi network to use the devices computing power to mine cryptocurrency, and I thought it might be interesting perform...Read More

vulscan - Vulnerability Scanning with Nmap

Introduction Vulscan is a module which enhances nmap to a vulnerability scanner. The nmap option -sV enables version detection per servic...

BySensei Fedon

vulscan - Vulnerability Scanning with Nmap

Introduction Vulscan is a module which enhances nmap to a vulnerability scanner. The nmap option -sV enables version detection per service which is used to determine potential flaws according to the identified product. The data is looked up in an offline version of...Read More

BruteSploit - Bruteforce And Manipulation Wordlist

BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be use...

BySensei Fedon

BruteSploit - Bruteforce And Manipulation Wordlist

BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and can be used in CTF for manipulation,combine,transform and permutation some words or file text. ...Read More

Wifite 2 - A complete re-write of Wifite (Automated Wireless Attack Tool)

A complete re-write of  wifite , a Python script for auditing  wireless  networks. What's new? Lots of files instead of "one...

BySensei Fedon

Wifite 2 - A complete re-write of Wifite (Automated Wireless Attack Tool)

A complete re-write of wifite, a Python script for auditing wireless networks. What's new? Lots of files instead of "one big script". Cleaner process management -- No longer leaves processes running in the background. UX: Target access points are refreshed every second instead of every 5 seconds. UX: Displays...Read More

Meterpreter Basic Commands

Using Meterpreter Commands Since the  Meterpreter  provides a whole new environment, we will cover some of the basic  Meterpreter  comman...

BySensei Fedon

Meterpreter Basic Commands

Using Meterpreter Commands Since the Meterpreter provides a whole new environment, we will cover some of the basic Meterpreter commands to get you started and help familiarize you with this most powerful tool. Throughout this course, almost every availableMeterpreter command is covered. For those that aren’t covered, experimentation is...Read More

Eternalromance: Exploiting Windows Server 2003

Eternalromance is another SMBv1 exploit from the leaked NSA exploit collection and targets Windows XP/Vista/7 and Windows Server 2003 and 2...

BySensei Fedon

Eternalromance: Exploiting Windows Server 2003

Eternalromance is another SMBv1 exploit from the leaked NSA exploit collection and targets Windows XP/Vista/7 and Windows Server 2003 and 2008. In the last hacking tutorial we have demonstrated how an unauthenticated attacks can exploit a Windows 7 target that is vulnerable to Eternalblue...Read More

Shodan’s New Tool Can Find Malware Command and Control Servers

Shodan is updated with a new feature which can find the malware command and control servers.

BySensei Fedon

Shodan’s New Tool Can Find Malware Command and Control Servers

Shodan is updated with a new feature which can find the malware command and control servers. ...Read More

LazyKali kali-linux tutorial

LazyKali is an awesome script written in bash shell. It can automate the whole update and install new tools in your hack repository. As the...

BySensei Fedon

LazyKali kali-linux tutorial

LazyKali is an awesome script written in bash shell. It can automate the whole update and install new tools in your hack repository. As the name suggests, you can get all the updates on Kali Linux and your repositories in one place by...Read More

Kali Linux 2017.1 Released With New Features | Download ISO Files And Torrents Here

Offensive Security has updated the Kali Linux images with new features and changes. Termed Kali Linux 2017.1, this release comes with su...

BySensei Fedon

Kali Linux 2017.1 Released With New Features | Download ISO Files And Torrents Here

Offensive Security has updated the Kali Linux images with new features and changes. Termed Kali Linux 2017.1, this release comes with support for wireless injection attacks to 802.11ac and Nvidia CUDA GPU. You can simply update your existing installation by running few commands...Read More