kalilinux Archive

ACE VoIP Directory Tool

ACE VoIP Directory Tool ACE (Automated Corporate Enumerator) is a simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on …

use Metasploit to extract emails

Out of the many useful auxiliary modules that metasploit has, one is called search_email_collector which searches google, bing and yahoo for email addresses associated to a particular domain. This is useful in automated information gathering during a penetration test program. The location …

Doona Bruteforce Exploit Detector Tool (BED)

Doona is a fork of the Bruteforce Exploit Detector Tool (BED). BED is a program which is designed to check daemons for potential buffer overflows, format string bugs etc. Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in …

Heartbleed Vulnerability exploitation

The Heartbleed vulnerability enables a hacker to trick OpenSSL by sending asingle byte of data while telling the server it sent 64K bytes of data. The server will then send back 64K bytes of data to be checked and echoed back. The server …

Add new exploits to Metasploit from Exploit-db

The Exploit Database is the ultimate archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Its aim is to serve as the most comprehensive collection of exploits gathered through direct submissions, mailing lists, and …

Top Nmap Commands

Top Nmap Command Examples For Sys/Network Admins Nmap is short for Network Mapper. It is an open source security tool for network exploration, security scanning and auditing. However, nmap command comes with lots of options that can make the utility more robust …

Like the article? please consider sharing it. Thank you

Advertisment ad adsense adlogger