Category: Exploitation


Attack on devices in the local network through a vulnerable router

How to bypass two-factor authentication with evilginx2

Network pivoting: concept, examples, techniques, tools

How to control computers via backdoor

Pupy manual: how to create a backdoor

How to install Pupy

How to use netcat (nc), ncat

How to run Armitage in Arch Linux and BlackArch

RouterSploit User Manual

Concealed control of a Windows-based computer (using Metasploit)