Tag Archives: Pentest

phpsploit- Stealth post-exploitation framework

PhpSploit is a remote control framework, aiming to provide a stealth interactive shell-like connection over HTTP between client and web server. It is a post-exploitation tool capable to maintain access to a compromised web server for privilege escalation purposes.


Evil Foca is a tool for security pentesters and auditors whose purpose is to test security in IPv4 and IPv6 data networks. The tool is capable of carrying out various attacks..

windows-privesc-check – Tool to Check Windows Privilege Escalation Vectors

windows-privesc-check -Windows operating systems include many security features to control access and privileges. It is possible to provide access based on roles and responsibilities beside providing a full access to modify the files/directories or read-only access. If you are looking

Sn1per – Automated Pentest Recon Scanner

Sn1per is an automated open source scanner that you can use during penetration testing. the tool allow to use some compilation of pentest utility such as the harvester , nmap and brute force against your target. some of the features

WPA/WPA2 Vulnerable to Brute-Force Attacks

Wireless network access points are everywhere so if you travel a lot you will find more than one AP at airports coffee shop or at the beach, I often try to scan different wireless network to check what type of

Patator Password Brute Forcing Utility


Brute forcing passwords is a simple way to hack any system, if there is no vulnerability at the remote system hackers will try this attack to get users password, one of major brute force tools issue that you face is

Websecurify Website Security Testing Framework

Over several years compromising web application is the first target for hackers, after attacking any website hacker under a certain name promotes the attack by adding it to www.zone-h.org.Zone-H.org is a website archive of versions of defaced websites.The sources of the hacked website