You can register an iTabCode account to be able to view iTabCode without ads. ( Registration is Free ) Register Now

metasploit

  1. x32x01

    Metasploit for Pentester: Sessions

    In this series of articles, we will be focusing on the various mechanisms of the Metasploit Framework that can be used by Penetration Testers. Today we are going to learn about the session’s command of the Metasploit Framework. Sessions command helps us to interact and manipulate the various...
  2. x32x01

    Metasploit for Pentester: Clipboard

    In this series of articles, we will be focusing on the various mechanisms of the Metasploit Framework that can be used by Penetration Testers. Here, we will be discussing the External API extension provided by Metasploit. Among other things, it provides the ability to target the clipboard of...
  3. x32x01

    Metasploit for Pentester: Inject Payload into Executable

    Being lurking and undetectable is the priority after anonymity. In this article, we are going to learn how to create an innocuous-looking backdoor and bind it with a legitimate executable file to gain the victims’ trust. Table of Content Pre-requisites for Lab set up Executable file search on...
  4. x32x01

    Metasploit for Pentester: Migrate

    In the continuation in this series of articles dedicated to the Metasploit Framework to provide an appropriate resource for Penetration Testers so that they can use the variety of the features present in the Metasploit Framework to the maximum extent. In this article, we will be talking about...
  5. x32x01

    Metasploit for Pentester: Windows Hidden Bind Shell

    In this article, we are going to cover the tactics of Hidden BIND TCP shellcode. Every organization has multiple scanning tools to scan their network and to identify the new or unidentified open ports. In this type of environment, it’s very difficult to hide the suspicious bind shellcode and...
  6. x32x01

    Metasploit for Pentester: Creds

    This is in continuation with the Metasploit for Pentester series of articles that we are presenting. More specifically we learned about the Workspaces and the Metasploit Database service in this article: Metasploit for Pentester: Database & Workspace. In this article, we will be discussing...
  7. x32x01

    Metasploit for Pentester: Database & Workspace

    In this series of articles, we are focusing on the various mechanisms of the Metasploit Framework that can be used by Penetration Testers. Today we are going to learn about the workspace and database commands of the Metasploit Framework. Table of Content Introduction Creating a Workspace...
  8. x32x01

    MSSQL for Pentester: Metasploit

    In this article, we will learn in detail how to pentest MSSQL servers using the Metasploit framework. Table of content Introduction Information Gathering & Enumeration Locating MSSQL Server Password Cracking Retrieving MSSQL version MSSQL Enumeration SQL Users Enumeration Capturing MSSQL...
  9. x32x01

    Msfvenom Cheatsheet: Windows Exploitation

    In this post, you will learn how to use MsfVenom to generate all types of payloads for exploiting the windows platform. Read beginner guide from here Table of Content Requirements MsfVenom Syntax Payload and its types Executable Payload (exe) Powershell Batch File HTML Application Payload...
  10. x32x01

    Msfvenom Tutorials for Beginners

    Hello friends!! Today we will learn to create payloads from a popular tool known as Metasploit, we will explore various option available within the tool to create payloads with different extensions and techniques. Msfvenom Msfvenom is a command line instance of Metasploit that is used to...
  11. x32x01

    How To Backdoor Windows Executables Using Metasploit (Msfvenom)

    Today, we’re going to create windows executable backdoor using Metasploit Exploitation Framework’s using msfvenom. How To Backdoor Windows Executables Using Metasploit First make sure Metasploit is already installed. If you’re using Mac/Linux you can install Metasploit by using this method...
  12. x32x01

    How To Remotely Install Keylogger on your Girlfriends Computer?

    Welcome back, Hackers! Many of you guys have emailed me asking about remotely hacking your victim’s computer. So the answer to this is “YES” it is possible. I have seen a lot of you guys have commented on our website. I’ll show you how to install Keylogger on your Husband’s, Wife’s, Girlfriend’s...
  13. x32x01

    Exploit and Backdoor Windows 7,8,10 Bypass Antivirus FUD

    Exploit and Backdoor Windows: I’m back with another tutorial on Hacking Windows 7,8,10 Bypass Antivirus 100% FUD. I’m using shellter AV Evasion tool along with FileZilla.exe server to bind a payload with it. Let’s get started! This tutorial is for Windows, Mac, Linux. Things you need to...
  14. x32x01

    List of Metasploit Commands - Cheatsheet

    Metasploit was created by H. D. Moore in 2003 as a portable network tool using Perl. By 2007, the Metasploit Framework had been completely rewritten in Ruby. On October 21, 2009, the Metasploit Project announced that it had been acquired by Rapid7, a security company that provides unified...
  15. x32x01

    Embedded Payload with Image - Undetectable Backdoor

    Welcome to Hack Today, Let’s start by Embedding Undetectable Payload with an Image. A tool which is design for attackers to perform phishing or social engineering attacks by generating fake image with embedded backdoor with .bat/.exe etc.. extension. Let’s get started! Download...
  16. x32x01

    Msfvenom - Metasploit Payloads Cheat Sheet

    Often one of the most useful (and to the beginner underrated) abilities of Metasploit is the msfpayload module. Multiple payloads can be created with this module and it helps something that can give you a shell in almost any situation. For each of these payloads you can go into msfconsole and...
  17. x32x01

    How to make Metasploit Persistent payload/backdoor in Termux

    What is the persistent payload? If you are using Metasploit and everything is going fine and suddenly the victim Restarts the phone or even kill the app the session will be disconnected. So you no longer can access the victim's phone and to access the phone again victim has to click on the app...
  18. x32x01

    Hack Android Phone Using Termux with Metasploit and Ngrok 2021

    How to Hack android phone using Termux with Metasploit. In this post, we are going to learn about how to hack android phones using termux with Metasploit. You can just copy-paste the commands one by one in the termux app and it will work perfectly. NOTE: This post is only for educational...
  19. x32x01

    How To Install Metasploit In Android using Termux [Without Root]

    Hey🙋‍♂️, This Post is the most Advanced post for termux and if you can learn it then you can do almost all sorts of things a beginner hacker should know. This is an advanced post on Metasploit. This tool is one of the most awesome things that you can use in termux so read it well. What is...
  20. x32x01

    Metasploit - The MSF

    Metasploit Framework (MSF) is the most widely used and very popular open source tool for pentesting. Metasploit Framework was first developed by HD Moore in 2001. Previously Metasploit was written in Perl; in 2007, it was totally rewritten in ruby and then in October 21, 2009 rapid7 acquired...
Top