You can register an iTabCode account to be able to view iTabCode without ads. ( Registration is Free ) Register Now


  1. x32x01

    Top 50 Hacking And Penetration Testing Tools [Compiled List 2021]

    From last few years, there will not be such a dividing line between security professionals and network engineers. Hacking tools are not the only thing necessary to successfully complete a PenTest, methodologies are also essential for ensuring that the assessor identifies all vulnerabilities...
  2. x32x01

    12 Best Operating Systems Used By Hackers

  3. x32x01

    Best TV Shows On Hacking & Technology

  4. x32x01

    Top 10 Tips To Protect From Online Hacking

  5. x32x01

    15 Powerful Gadgets For Ethical Hackers | Hardware Tools for Hackers in 2021

    Our in this platform we usually talk about various applications and their uses to check loopholes on systems. But penetration testers not only uses software applications, they also need some hardware to perform the tasks. In this detailed article we are going to cover hardware devices & gadgets...
  6. x32x01

    Evil Twin Attack with DNSMASQ - Wireless WPA2-PSK Cracking

    Ever heard of an evil twin AP? An evil twin AP is like a rogue access point. The attacker creates a fake wireless AP to lure users into thinking it’s a trusted wireless network. They amplify their signal in a way where the client will automatically connect to them because the beacons are faster...
  7. x32x01

    ShellShock and BeEF Framework - Exploitation Tutorial

    In a previous tutorial, we successfully exploited the ShellShock Vulnerability with Metasploit Framework and Burp Suite. And in this article we’ll gonna exploit the same vulnerability with BeEF Framework which is one of the most popular Browser Exploitation Framework but it is not actively...
  8. x32x01

    File Upload Exploitation and Its Prevention - Detailed Guide 2021

    Well as you all knows that, file upload control is always at major risk for developers because there are N number of ways to bypass this control and an attacker can easily upload any malicious file to the server. Once the malicious file got uploaded to server, an attacker can easily gain the...
  9. x32x01

    Exploitation of WPA/WPA2-PSK with WiFiBroot - Kali Linux 2021

    These days, wireless networks are everywhere. With users being on the go like never before, having to remain stationary because of having to plug into an Ethernet cable to gain Internet access is not feasible. For this convenience, there is a price to be paid; wireless connections are not as...
  10. x32x01

    Node.js Deserialization Attack - Detailed Tutorial 2021

    Node.js is a Javascript runtime. It encapsulates the Google V8 engine. The Google V8 engine quickly runs Javascript with high performance. Node.js optimizes certain special cases and provides substitute APIs, which enables the Google V8 engine to run more effectively in a non-browser...
  11. x32x01

    Exploit Windows with Malicious MS-OFFICE File [Metasploit Framework]

    Metasploit has for years supported encoding payloads into VBA code. (VBA, or Visual Basic for Applications, is the language that Microsoft Office macros are written in.) Macros are great for pentesters, since they don’t rely on a specific version, and they are a supported method of code...
  12. x32x01

    Create a Fake AP with DNSMASQ and HOSTAPD [Kali Linux]

    Do you ever think twice before connecting to a free public wireless hotspot at a coffee shop, airport, or hotel? Did you ever stop to wonder if the public Wi-Fi hotspot you just connected to is a legitimate one, or if it might be an Evil Twin hotspot in disguise? After setting up the fake AP...
  13. x32x01

    Sniffing with Rogue Access Point [DNSMASQ and TCPFLOW]

    Wireless networking is a complex field.With countless standards, protocols, and implementations, it is not uncommon for administrators to encounter configuration issues that require sophisticated troubleshooting and analysis mechanisms. Traditional network sniffing on an Ethernet network is...
  14. x32x01

    Live Packet Sniffing with Python [Search][Post Data]

    A sniffer is a program that monitors data traveling over a network. Unauthorized sniffers are dangerous to network security because they are difficult to detect and can be inserted almost anywhere, which makes them a favorite weapon of hackers. When used by malicious individuals, sniffers can...
  15. x32x01

    Ultimate phishing tool with Ngrok [SocialFish]

    SocialFish is an open source tool through which you can easily create a phishing page of most popular websites like Facebook/Twitter/Github etc and can even be integrated with NGROK which is an another open source tunnel service which forward your localhost URL to some public DNS URL. Ngrok...
  16. x32x01

    Exploitation of EternalBlue DoublePulsar [Windows 7 - 64bit]

    EternalBlue Metasploit exploits a vulnerability in Microsoft’s implementation of the Server Message Block (SMB) protocol. The vulnerability exists because the SMB version 1 (SMBv1) server in various versions of Microsoft Windows mishandles specially crafted packets from remote attackers...
  17. x32x01

    Find Vulnerable Webcams with Shodan [Metasploit Framework]

    As we all knows that, Shodan is one of the most popular and dangerous search engine which gives you all information from the banners and pulls from web-enabled devices like routers/switches/traffic-lights/scada/cameras etc. There are many ways to find web cams on Shodan. Usually, using the name...
  18. x32x01

    Windows 10 Exploitation with an Image [Metasploit Framework - 2021]

    Metasploit is currently the most buzzing word in the field of information security and penetration testing. It has totally revolutionized the way we can perform security tests on our systems. The reason which makes Metasploit so popular is the wide range of tasks that it can perform to ease the...
  19. x32x01

    CTF - Billu B0x - Walkthrough step by step

    Billu:B0x VM is created by one of the most popular Indian Ethical Hacker named as “Manish Kishan Tanwar” (a.k.a Indishell Hacker) who has created so many web shells in PHP language hosted at Download VM Link –,188/ The very first step is to...
  20. x32x01

    Live Detection and Exploitation of WordPress xmlrpc.php File

    Being as popular cms, it is no surprise that WordPress is often always under attack. Some 70% of Techno’s top 100 blogs are using WordPress as a Content Management System. XML-RPC on WordPress is actually an API (Application program interface), remote procedure call which gives developers who...