Kali Tutorials Archives - Page 2 of 4 - Ibnshehu
Wednesday, October 23, 2019

Kali Tutorials

Kali Linux is one of the best open-source security packages of an ethical hacker, containing a set of tools divided by categories. Kali Linux can be installed in a machine as an Operating System, which is discussed in this tutorial. Installing Kali Linux is a practical option as it provides more options to work and combine the tools. This tutorial gives a complete understanding on Kali Linux and explains how to use it in practice.

Linux Post Exploitation Framework

RedGhost – Linux Post Exploitation Framework Designed To Gain Persistence And Reconnaissance And Leave...

Linux post exploitation framework designed to assist red teams in gaining persistence, reconnaissance and leaving no trace.  Payloads...

One-Lin3r – Aid You In Penetration Testing Operations, Privilege Escalation And More

One-Lin3r is simple modular and light-weight framework gives you all the one-liners that you will need while penetration testing (Windows, Linux, macOS...

GhostDelivery – .vbs script to deliver payload with persistence

Python script to generate obfuscated .vbs script that delivers payload (payload dropper) with persistence and windows antivirus disabling functions.

Recsech – Footprinting And Reconnaissance Tool On The Target Web

Recsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected,...

Salsa Tools – An AV-Safe Reverse Shell dipped on bellota sauce

Salsa Tools is a collection of three different tools that combined, allows you to get a reverse shell on steroids in any...

Finshir – An asynchronous Low & Slow traffic generator, written in Rust

You are seeing finshir, an ergonomic, asynchronous, and fully customisable implementation of Low & Slow load generator designed for real-world pentesting. You can...

autoPwn – Automate Repetitive Tasks For Fuzzing

Warning Completely re-writing this right now. Focus will be on interactive Linux apps that only take input from...

BoomER – Framework For Exploiting Local Vulnerabilities

BoomER is an open source framework, developed in Python. The tool is focused on post-exploitation, with a main objective, the detection and...

H8Mail v2.0 – Email OSINT And Password Breach Hunting

Powerful and user-friendly password finder.Use h8mail to find passwords through different breach and reconnaissance services, or using local breaches such as Troy Hunt's "Collection1" or the infamous...

Facebash – Facebook Brute Forcer In Shellscript Using TOR

Legal disclaimer: Usage of Facebash for attacking targets without prior mutual consent is illegal. It's the end user's responsibility...

Stay connected


Latest article


DetExploit – Software That Detect Vulnerable Applications, Not-Installed OS Updates And Notify To User

Abstract DetExploit is software that detect vulnerable applications and not-installed important OS updates on the system, and notify them...

PrivExchange – Exchange Your Privileges For Domain Admin Privs By Abusing Exchange

POC tools accompanying the blog Abusing Exchange: One API call away from Domain Admin. Requirements These tools...
threat intelligence

ACT Platform – Open platform for collection and exchange of threat intelligence information

Semi-Automated Cyber Threat Intelligence (ACT) is a research project led by mnemonic as with contributions from the University of Oslo, NTNU, Norwegian Security...