Category: Exploitation

 

How to find and analyze information in RAM

How to open and exploit .DS_Store

Attack on devices in the local network through a vulnerable router

How to bypass two-factor authentication with evilginx2

Network pivoting: concept, examples, techniques, tools

How to control computers via backdoor

Pupy manual: how to create a backdoor

How to install Pupy

How to use netcat (nc), ncat

How to run Armitage in Arch Linux and BlackArch