Category: Exploitation


SMB and Samba Security Audit Tools

IP camera security audit

What is HNAP, how to find and exploit routers with HNAP

How to speed up the scanning of large networks ranges

Best Kali Linux tools in WSL (Windows Subsystem for Linux) (Part 1)

How to exploit blind command injection vulnerability

Command injection: exploitation and automated vulnerability search

How to make changes in browser Developer Tools persist after page reload

sshprank: SSH mass-scanner, login cracker and banner grabber

RDP Security Audit