Advanced Hacking Tutorials Collection

The world’s most advanced ethical hacking tutorials bookmark compilation.

These tutorials are best place to start and is dedicated to those who are in need of learn from beginners to advanced.

  1. Get Free Kali Linux on AWS with Public IP – Real Time Penetration Testing
  2. Detection and Exploitation of OpenSSL Heartbleed Vulnerability using NMAP and METASPLOIT
  3. Hack Android using Metasploit over LAN/WAN
  4. Generate 100% FUD Backdoor with TheFatRat – Windows 10 Exploitation
  5. SSLKILL – Forced Man in the Middle Attack – Sniff HTTPS/HTTP
  6. Hack Android using Metasploit without Port Forwarding over Internet – 2017
  7. Hack Windows 10 Remotely over WAN with Metasploit [No Port Forwarding]
  8. Hack Windows 10 using CHAOS Framework – 100% FUD
  9. Persistent Backdoor in Android using Kali Linux with a Shell script
  10. Crack WPA/WPA2-PSK using Aircrack-ng and Hashcat – 2017
  11. Hack a website with Ngrok, Msfvenom and Metasploit Framework
  12. Creating an undetectable payload using Veil-Evasion Toolkit
  13. Sniff HTTPS/FTP Packets using SSLSTRIP and DSNIFF – ARP Spoofing MITM Attack
  14. Hack Windows/Linux using ARCANUS Framework – 100% FUD
  15. Live SQL Injection Exploitation with SQLMap – A Detailed Guide
  16. Change Windows Password of Remote PC via METASPLOIT
  17. Advanced Error Based SQL Injection Exploitation – Manually
  18. Automated MITM Attack with MitmAP Python Script
  19. DKMC – Another Wonderful Malicious Payload Evasion Tool (Windows Hacking)
  20. Bypass Hidden SSID in a Wireless Network [Full Proof Method]
  21. Wi-Fi deauthentication attack against 802.11 protocol
  22. Pentesting Windows 2000/2003 Server with Metasploit Framework – Detailed Tutorial
  23. SEToolkit – Credential Harvester Attack [Tutorial]
  24. Crack WPA2-PSK with Aircrack – Dictionary Attack Method
  25. HTTP PUT Method Exploitation – Live Penetration Testing
  26. MySQL Pentesting with Metasploit Framework
  27. PHP CGI Argument Injection With Metasploit Framework
  28. Man in the Middle Attack with Websploit Framework
  29. DDOS a WiFi Network with MDK3 Tool in Kali Linux
  30. Sniffing with Xerosploit – An Advanced MITM Framework
  31. Privilege Escalation via SQL Injection in Joomla 3.8.3 – Live Exploitation
  32. Live Detection and Exploitation of WordPress xmlrpc.php File
  33. [Exploitation] Apache Struts OGNL Code Execution Vulnerability – CVE-2017-9791
  34. Perform DOS Attack with 5 Different Tools – 2018 Update
  35. Windows 10 Exploitation with an Image [Metasploit Framework – 2018]
  36. [Code Execution] – preg_replace() PHP Function Exploitation
  37. WEP Cracking with Kali Linux 2018.1 [Tutorial]
  38. Exploitation of EternalBlue DoublePulsar [Windows 7 – 64bit] with Metasploit Framework
  39. Sniffing with Rogue Access Point [DNSMASQ and TCPFLOW]
  40. Create a Fake AP with DNSMASQ and HOSTAPD [Kali Linux]
  41. Exploit Windows with Malicious MS-OFFICE File [Metasploit Framework]
  42. Host Header Attack – Practical Exploitation and Prevention
  43. Node.js Deserialization Attack – Detailed Tutorial 2018
  44. Apache Java Struts2 Rest Plugin Exploitation – CVE-2017–9805
  45. Exploitation of WPA/WPA2-PSK with WiFiBroot – Kali Linux 2018
  46. File Upload Exploitation and Its Prevention – Detailed Guide 2018
  47. ShellShock Vulnerability Exploitation With Metasploit Framework
  48. ShellShock Vulnerability Exploitation With HTTP Request
  49. Linux Privilege Escalation With Kernel Exploit – [8572.c]
  50. Exploitation of ShellShock Vulnerability with BadBash Tool
  51. ShellShock Exploitation with BurpSuite [PentesterLab] – CVE-2014-6271
  52. ShellShock and BeEF Framework – Exploitation Tutorial
  53. Post Exploitation with PowerShell Empire 2.3.0 [Detailed Tutorial]
  54. Drupal 7 Exploitation with Metasploit Framework [SQL Injection]
  55. Evil Twin Attack with DNSMASQ – Wireless WPA2-PSK Cracking
  56. Exploitation of Opendreambox – Remote Code Execution
  57. Privilege Escalation with PowerShell Empire and SETOOLKIT [Kali Linux]
  58. Exploitation of DVR Cameras – CVE-2018-9995 [Tutorial]
  59. HTTP PUT Method Exploitation with Put2Win (Meterpreter Shell)
  60. From Command Injection To Meterpreter Shell – Detailed Tutorial 2018
  61. JAVA RMI (Remote Method Invocation) Exploitation with Metasploit Framework
  62. From RFI(Remote File Inclusion) to Meterpreter Shell
  63. From Command Execution To Meterpreter Reverse Shell with Commix
  64. [RCE] Exploitation of Microsoft Office/WordPad – CVE-2017-0199 [Tutorial]
  65. Exploitation of UnreaIIRCd 3.2.8.1 by using Metasploit and Perl Script