Backdoor factory shellcode

Backdoor factory – How to inject shell-code into windows application

Backdoor factory (BDF) is a pre-installed application in Kali Linux, its used to inject shell-code to any windows application. BDF can inject custom shell-code to an existing binary by adding malicious code in between the genuine source code. First it scans the entire binary and checks compatible payloads then it searches the entire code and […]

torghost

TorGhost – channel all traffic through tor network in kali linux

Tor is one of the best freely available network to protect your identity. Its considered safe because of its highly cryptographic data transfer methods. I’m not going to explain working of tor in detail, if you are interested pls read my previous blog on How to change tor exit node manually. You can switch between exit […]

what is dns leak

What is DNS leak and how it affects your anonymity

WHAT IS DNS DNS or Domain Name System is like internet phonebook. Humans identify things people places by names whereas computers only know numbers. Each and every URL you type for example www.example.com, you are first directed to the DNS server which searches for the correct Ip address of the url or domain name that […]

censys-hacker-friendly-search-engine-exposing-all-internet-connected-devices

CENSYS – Hacker friendly search engine exposing all internet connected devices

When John Matherly released SHODAN, search engine which could collect data on web servers like HTTP port 80, FTP etc. It was considered a success, in the hackers point of view. And now there’s censys. Censys is just like shodan but, more user friendly and works in a better and broader way. Censys is like […]

How to find website admin panel using cpscan

How to find website admin panel using cpscan

Most of the websites have their own custom control panel/admin panel other than the server cpanel. They are simply programmed in php, html and java like languages. These admin panel can control the website completely other than the server settings. Once you have access to this then you can upload new images, edit pages and […]

what is dos coin doscoin khromozome

What is DOScoin?

DoS (denial of service ) attack, is the most popular way of attacking a website or a computer used by the, so called, hacktivists out there. It is nothing but sending too much junk information to a server or website, more than the threshold which causes crashing down of computers, websites and even servers. DoS […]

How control your kali machine with android device using SSH

How to control your kali machine with android device using SSH

First of all let me say that this is not a big deal for pro hackers and network administrators. We are going to control kali linux machine with an Android device using SSH (secure shell) service. SSH protocol allows you to connect to a remote system and interact with shell with highly encrypted communication method. […]

windows-login-by-replacing-utilman-exe

Backdoor windows login by replacing utilman.exe

Forgot windows login password? Need to drop a simple backdoor on windows? Then this blog will help you. Utilman.exe is a program designed for users with some disabilities. Utilman enables accessibility features like magnification, narration, virtual keyboard, high contrast themes, etc. This can be helpful for people who have poor vision or with hearing problems. […]

windows privilege escalation using bypassuac_vbs metasploit

windows privilege escalation using “bypassuac vbs” metasploit

Hacking any windows system is an easy process with metasploit. We can use many techniques to compromise windows by either exploiting a remote code execution or malicious file attack. Code is often embedded with genuine applications or executed remotely on an application with limited privileges. When we use getsystem command it will return an error “access […]