Kali Tutorials Archives - Ibnshehu
Wednesday, October 23, 2019
Home Kali Tutorials

Kali Tutorials

Kali Linux is one of the best open-source security packages of an ethical hacker, containing a set of tools divided by categories. Kali Linux can be installed in a machine as an Operating System, which is discussed in this tutorial. Installing Kali Linux is a practical option as it provides more options to work and combine the tools. This tutorial gives a complete understanding on Kali Linux and explains how to use it in practice.


How to Create actionable data from your Vulnerability Scans using VulnWhisperer

VulnWhisperer is a vulnerability management tool and report aggregator. VulnWhisperer will pull all the reports from the different Vulnerability scanners and create...
built-in Windows AutoElevate backdoor

Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor

For defeating windows user account by abusing built-in Windows AutoElevate backdoor. The following must be considered: System...

Objection – Runtime Mobile Exploration

introduction objection is a runtime mobile exploration toolkit, powered by Frida. It was built with the aim of helping assess mobile...
Commando vm

Commando VM – Full Windows-based penetration testing virtual machine distro

Welcome to Commando VM - a fully customized, Windows-based security distribution for penetration testing and red teaming. Installation...

Passpie: Command Line Password Manager for Multi-Platform

Passpie is a command line tool to manage passwords from the terminal with a colorful and configurable interface. Use a master passphrase...

Slackor – Golang implant that uses Slack as a command & control server

This project was inspired by Gcat and Twittor. This tool is released as a proof...
facebook checker

Mass Account Checker for Facebook

Installation You can simply install Facebook Mass Account Checker as follows: apt install git apt install...

iKy – Tool that collects information from an email and shows results in a...

Project iKy is a tool that collects information from an email and shows results in a nice visual interface.

Cryptr – Simple shell utility for encrypting and decrypting files using OpenSSL

Installation git clone https://github.com/nodesocket/cryptr.git ln -s "$PWD"/cryptr/cryptr.bash /usr/local/bin/cryptr Bash tab completion Add tools/cryptr-bash-completion.bash to your...

VulnX – Intelligent Bot Auto Shell Injector that detect vulnerabilities in multiple types of...

Vulnx is An Intelligent Bot Auto Shell Injector that detect vulnerabilities in multiple types of Cms, fast cms detection,informations gathering and vulnerabilitie Scanning of the...

Stay connected


Latest article


DetExploit – Software That Detect Vulnerable Applications, Not-Installed OS Updates And Notify To User

Abstract DetExploit is software that detect vulnerable applications and not-installed important OS updates on the system, and notify them...

PrivExchange – Exchange Your Privileges For Domain Admin Privs By Abusing Exchange

POC tools accompanying the blog Abusing Exchange: One API call away from Domain Admin. Requirements These tools...
threat intelligence

ACT Platform – Open platform for collection and exchange of threat intelligence information

Semi-Automated Cyber Threat Intelligence (ACT) is a research project led by mnemonic as with contributions from the University of Oslo, NTNU, Norwegian Security...