Sign in
Sign in
Recover your password.
A password will be e-mailed to you.
How to upload a shell in Textpattern <= 4.8
Textpattern CMS is a free, PHP open source CMS (content management system) with a browser-based interface in over 50 languages.
Pass the hash attack with Mimikatz
What is Mimikatz?
Mimikatz is an open-source application that allows users to view and save authentication credentials like Kerberos tickets. Benjamin Delpy continues to lead Mimikatz developments, so the toolset works with the current…
Scan for vulnerabilities with Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and…
Using crackmapexec to do a credential spraying attack
CrackMapExec (a.k.a CME) is a post-exploitation tool that helps automate assessing the security of large Active Directory networks. Using we can brute force credential for active directory protocols. All protocols support brute-forcing and…
How To Upload A Shell In OpenAdmin V18.1.1 (Authenticated)
OpenNetAdmin is an IPAM (IP Address Management) application that allows you to keep track of network attributes like DNS names, IP addresses, Subnets, and MAC addresses.
How To Upload A Shell In pfsense 2.1.3 (Authenticated)
pfSense is a free and open source firewall and router with centralized threat control, load balancing, multi-WAN, and other functions.
How to upload a shell in HelpdeskZ v1.0.2
HelpDeskZ is a free PHP-based program that lets you control your site's support via a web-based ticketing system.
Double pivoting with Chisel
hello folks
in this topic, we will talk about a sensitive thing what if you got a shell on the machine but there aren't SSH client or server and also you don't have Meterpreter to run autoroute and start pivoting so today I will talk about…
Double pivoting with SSH
Hello folks
today we will talk about SSH scenarios that I made to be more complex with double pivoting :D, 3 scenarios will be Explained
so at first, we have
1- attacker to(first- machine SSH Server) to (second-machine SSH Client) to…
double pivoting with meterpreter
hello folks
today we will talk about double pivoting using Meterpreter shell sessions
I will just focus on pivoting and some techniques - without exploitation because that, not our topic today
at first, this is our topology
our…