Kali Tutorials Archives - Ibnshehu
Home Kali Tutorials

Kali Tutorials

Kali Linux is one of the best open-source security packages of an ethical hacker, containing a set of tools divided by categories. Kali Linux can be installed in a machine as an Operating System, which is discussed in this tutorial. Installing Kali Linux is a practical option as it provides more options to work and combine the tools. This tutorial gives a complete understanding on Kali Linux and explains how to use it in practice.

built-in Windows AutoElevate backdoor

Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor

For defeating windows user account by abusing built-in Windows AutoElevate backdoor. The following must be considered: System...
VulnWhisperer

How to Create actionable data from your Vulnerability Scans using VulnWhisperer

VulnWhisperer is a vulnerability management tool and report aggregator. VulnWhisperer will pull all the reports from the different Vulnerability scanners and create...
Photo Geolocation

Tracking Photo’s Geo-location to See Where the Photo Was Taken

This article is about collecting metadata from photographs. Metadata is information which is created for every file’s format. Examples for metadata: file created...
Sparta

SPARTA – Network Penetration Testing GUI Toolkit

SPARTA is GUI application developed with python and inbuild Network Penetration Testing Kali Linux tool. It simplifies scanning and enumeration phase with faster results.
Get Clients and Access Points

Airopy – Get Clients and Access Points with Alfa Cards

Get clients and access points. With Alfa cards, this script works correctly. Dependencies To run this...
objection

Objection – Runtime Mobile Exploration

introduction objection is a runtime mobile exploration toolkit, powered by Frida. It was built with the aim of helping assess mobile...
WiFiBroot

WiFiBroot – A WiFi Pentest Cracking Tool For WPA/WPA2

WiFiBroot is built to provide clients all-in-one facility for cracking WiFi (WPA/WPA2) networks. It heavily depends on scapy, a well-featured packet manipulation library...
Commando vm

Commando VM – Full Windows-based penetration testing virtual machine distro

Welcome to Commando VM - a fully customized, Windows-based security distribution for penetration testing and red teaming. Installation...
vulnx

VulnX – Intelligent Bot Auto Shell Injector that detect vulnerabilities in multiple types of...

Vulnx is An Intelligent Bot Auto Shell Injector that detect vulnerabilities in multiple types of Cms, fast cms detection,informations gathering and vulnerabilitie Scanning of the...
slackor

Slackor – Golang implant that uses Slack as a command & control server

This project was inspired by Gcat and Twittor. This tool is released as a proof...

Stay connected

0FansLike
0FollowersFollow
0FollowersFollow

Latest article

phishing simulation

Phishing Simulation – Aims To Increase Phishing Awareness By Providing An Intuitive Tutorial And...

Phishing Simulation mainly aims to increase phishing awareness by providing an intuitive tutorial and customized assessment (without any actual setup - no...
WiFiBroot

WiFiBroot – A WiFi Pentest Cracking Tool For WPA/WPA2

WiFiBroot is built to provide clients all-in-one facility for cracking WiFi (WPA/WPA2) networks. It heavily depends on scapy, a well-featured packet manipulation library...
GitHub Faces Class-Action Lawsuit

GitHub Faces Class-Action Lawsuit

Following the aftermath of Capital One breach happened earlier this week, the firms involved in the incident, in one or the other way, are...