All Writeups

Phishing with Zphisher Install Navigate to the zphisher github copy the url In a terminal, type […]
URL masking can be used to masquerade a domain you are working with. For this we […]
Creating Temporary public URLs that point to the local server you have setup. Serveo — This […]
Creating encoded Reverse shells with FatRat Launch Ngrok — Tunneling with Ngrok Open a terminal and […]
Ngrok is a tunnelling tool that creates secure tunnels to your localhost. This allows the host […]
Install gr33n37-ip-changer – https://github.com/gr33n37/gr33n37-ip-changer “`git clone https://github.com/gr33n37/gr33n37-ip-changer.git“` “`cd gr33n37-ip-changer“ Install Tor “`sudo apt install tor“` Usage […]
Create a text file with extension types .php .php3 .php4 .php5 .phtml Launch Burp Enable intercept […]
The 4 way handshake Router sends a challenge: The router (or access point) sends a challenge” to […]
Using Metasploit to create a document with malicious macros Launch Metasploit use exploit/multi/fileformat/office_word_macro set payload  windows/meterpreter/reverse_tcp […]
Active Directory (AD) is used by approximately 90% of the Global Fortune 1000 companies. If an […]