Kali Tutorials Archives - Page 2 of 4 - Ibnshehu

Kali Tutorials

Kali Linux is one of the best open-source security packages of an ethical hacker, containing a set of tools divided by categories. Kali Linux can be installed in a machine as an Operating System, which is discussed in this tutorial. Installing Kali Linux is a practical option as it provides more options to work and combine the tools. This tutorial gives a complete understanding on Kali Linux and explains how to use it in practice.


One-Lin3r – Aid You In Penetration Testing Operations, Privilege Escalation And More

One-Lin3r is simple modular and light-weight framework gives you all the one-liners that you will need while penetration testing (Windows, Linux, macOS...

GhostDelivery – .vbs script to deliver payload with persistence

Python script to generate obfuscated .vbs script that delivers payload (payload dropper) with persistence and windows antivirus disabling functions.

Recsech – Footprinting And Reconnaissance Tool On The Target Web

Recsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected,...

Salsa Tools – An AV-Safe Reverse Shell dipped on bellota sauce

Salsa Tools is a collection of three different tools that combined, allows you to get a reverse shell on steroids in any...

Finshir – An asynchronous Low & Slow traffic generator, written in Rust

You are seeing finshir, an ergonomic, asynchronous, and fully customisable implementation of Low & Slow load generator designed for real-world pentesting. You can...

autoPwn – Automate Repetitive Tasks For Fuzzing

Warning Completely re-writing this right now. Focus will be on interactive Linux apps that only take input from...

BoomER – Framework For Exploiting Local Vulnerabilities

BoomER is an open source framework, developed in Python. The tool is focused on post-exploitation, with a main objective, the detection and...

H8Mail v2.0 – Email OSINT And Password Breach Hunting

Powerful and user-friendly password finder.Use h8mail to find passwords through different breach and reconnaissance services, or using local breaches such as Troy Hunt's "Collection1" or the infamous...

Facebash – Facebook Brute Forcer In Shellscript Using TOR

Legal disclaimer: Usage of Facebash for attacking targets without prior mutual consent is illegal. It's the end user's responsibility...

PhoneSploit v1.2 – Using Open Adb Ports We Can Exploit Andriod Device

Using open Adb ports we can exploit a device.  You can find open ports here https://www.shodan.io/search?query=android+debug+bridge+product%3A”Android+Debug+Bridge”

Most popular

Recent posts