Yuki Chan – The Automated Penetration Testing Tool – Kali Linux 2017.2

The Yuki Chan is an Automated Penetration Testing tool through which you can easily audit any website and gather all possible information like website enumeration, ssl security auditing etc. Features – Fully Automated Tool Intel-Gathering with smart search Complete Vulnerability Analysis Full Security Auditing Integration with OSINT Framework Tracking & System Enumeration Support Fuzzing Module […]


MSFvenom Payload Creator (MSFPC) – Installation and Usage

With the help of MSFPC, you can quickly generate the payload based on msfvenom module which is a part of Metasploit Framework. So MSFvenom Payload Creator is a simple wrapper to generate multiple types of payloads like APK(.apk), ASP(.asp), ASPX(.aspx), BASH(.sh), Java(.jsp), Linux(.elf), OSX(.macho), Perl(.pl), PHP(.php), Powershell(.ps1), Python(.py), Tomcat(.war) and Windows(.exe/.dll). The only necessary input […]


MYSQL Command Line Tutorial – Kali Linux

As you all knows, Kali Linux is one of the most popular penetration testing operating system having more than 400+ hacking tools pre-installed in it. Kali is the latest and greatest version of the ever popular Backtrack Linux penetration testing distribution. The creators of the Backtrack series kept Kali in a format very similar to […]


About Wireshark – A Packet Sniffer and its Components

The purpose of this article is to introduce the most popular packet sniffer i.e. WIRESHARK.  The basic tool for observing the messages exchanged between executing protocol entities is called a packet sniffer. As the name suggests, a packet sniffer captures (“sniffs“) messages being sent/received from/by your computer; it will also typically store and/or display the contents […]

Tech News

Vevo Hacked by OurMine – 3.12TB data leaked

OurMine Group (Saudi Arabian Hacking Group) is now back and has claimed the responsibility for the breach of Vevo which is the most popular online video streaming service. Even Vevo.com is now not available, they’ve already put a Under Maintenance page due to this recent hacking attempt by OurMine Group. In starting phase, One of […]


Steal Windows Product Key Remotely with Metasploit Framework

As discussed previously, we had successfully exploited a windows machine with Metasploit Framework and created an administrator user in targeted machine. Now in this article, we’ll another exploit which steals the Windows Product Key remotely. Read Here: How to Hack Windows Machine with Metasploit Framework For this methods, run the “NETAPI Exploit” (specially for Windows […]