Kali Tutorials Archives - Page 3 of 4 - Ibnshehu
Wednesday, October 23, 2019

Kali Tutorials

Kali Linux is one of the best open-source security packages of an ethical hacker, containing a set of tools divided by categories. Kali Linux can be installed in a machine as an Operating System, which is discussed in this tutorial. Installing Kali Linux is a practical option as it provides more options to work and combine the tools. This tutorial gives a complete understanding on Kali Linux and explains how to use it in practice.


PhoneSploit v1.2 – Using Open Adb Ports We Can Exploit Andriod Device

Using open Adb ports we can exploit a device.  You can find open ports here https://www.shodan.io/search?query=android+debug+bridge+product%3A”Android+Debug+Bridge”

Sliver – General Purpose Cross-Platform Implant Framework

Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants are dynamically compiled with unique...

URLextractor – Information Gathering and Website Reconnaissance

Information gathering & website reconnaissance Usage: ./extractor http://www.hackthissite.org/ Tips: Colorex: put colors to the...

Userrecon V1.0 – Find Usernames Across Over 75 Social Networks

This is useful if you are running an investigation to determine the usage of the same username on different social networks.

Trape – People tracker on the Internet (The evolution of phishing attacks) OSINT

Trape is a recognition tool that allows you to track people, the information you can get is very detailed. We want to teach...
tinfoleak ui

Tinfoleak v2.4 – The Most Complete Open-Source Tool For Twitter Intelligence Analysis

The most complete open-source tool for Twitter intelligence analysis Introduction tinfoleak is an open-source tool within...

EagleEye – Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles Using Image...

Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles Using Image Recognition And Reverse Image Search.This only works if their Facebook Profile is...
MITM attack netcred

Password Pentesting with Net-Creds to Sniff out Username and Password of Users in your...

In this Kali Linux Tutorial, we show you how to use Net Creds to launch a MITM attack.Net creds is a python based script...
Photo Geolocation

Tracking Photo’s Geo-location to See Where the Photo Was Taken

This article is about collecting metadata from photographs. Metadata is information which is created for every file’s format. Examples for metadata: file created...

How to Reset Windows 10 / 8 / 7 Admin and Login Password

So, you’ve lost your Windows admin password. Maybe you recently reset Windows password, and can’t recall what you changed it to. Maybe...

Stay connected


Latest article


DetExploit – Software That Detect Vulnerable Applications, Not-Installed OS Updates And Notify To User

Abstract DetExploit is software that detect vulnerable applications and not-installed important OS updates on the system, and notify them...

PrivExchange – Exchange Your Privileges For Domain Admin Privs By Abusing Exchange

POC tools accompanying the blog Abusing Exchange: One API call away from Domain Admin. Requirements These tools...
threat intelligence

ACT Platform – Open platform for collection and exchange of threat intelligence information

Semi-Automated Cyber Threat Intelligence (ACT) is a research project led by mnemonic as with contributions from the University of Oslo, NTNU, Norwegian Security...