Exploitation tools

Crackmap exec part 2

CrackMapExec in Action: Enumerating Windows Networks (Part 2)

Introduction CrackMapExec, or CME for short, is a handy tool used to check the security of Windows networks during internal tests. It helps to figure out what devices are connected to the network and what services they’re running. It also helps to find shared files, users, and groups on the network. In our previous post’s […]

CrackMapExec in Action: Enumerating Windows Networks (Part 2) Read More »

Crackmap Exec Part 1

Crackmapexec Full Tutorial part 1 [Updated 2024]

Introduction CrackMapExec, also known as CME, is a helpful tool for checking how safe Windows networks are, especially during internal pentesting assessments. It’s used to explore networks, finding out what computers are connected and what services they’re running. It also looks for shared folders, user accounts, and groups within the network. In this article, we’ll

Crackmapexec Full Tutorial part 1 [Updated 2024] Read More »

4 ways to generate reverse shell

4 Ways to Generate Reverse Shell Faster in [2024]

Introduction In this article, we’ll explore a simple method for obtaining a reverse shell. Typically, the challenge with reverse shell commands lies in remembering their lengthy and complex syntax. However, thanks to the advancing AI in our digital realm, this hurdle has been addressed. Let’s delve into how it’s achieved through the contents of this

4 Ways to Generate Reverse Shell Faster in [2024] Read More »

Metasploit

Information Gathering using Metasploit

Introduction In this post, You will learn how to do Information gathering using Metasploit and yes it is possible to gather information using Metasploit. Video Information gathering using Metasploit The base for any successful hacking is information gathering, It can be passive or active information gathering and the Metasploit comes with pre-installed tools which can

Information Gathering using Metasploit Read More »