Skip to content
Main Menu
Vulnerability Assessment
Menu Toggle
Top 20 Microsoft Azure Vulnerabilities and Misconfigurations
CMS Vulnerability Scanners for WordPress, Joomla, Drupal, Moodle, Typo3..
Nessus Plugin Library
Detailed Overview of Nessus Professional
Install Nessus and Plugins Offline (with pictures)
Penetration Testing
Menu Toggle
Top 10 Vulnerabilities: Internal Infrastructure Pentest
Top 16 Active Directory Vulnerabilities
19 Ways to Bypass Software Restrictions and Spawn a Shell
Empire Module Library
CrackMapExec Module Library
Accessing Windows Systems Remotely From Linux
Menu Toggle
RCE on Windows from Linux Part 1: Impacket
RCE on Windows from Linux Part 2: CrackMapExec
RCE on Windows from Linux Part 3: Pass-The-Hash Toolkit
RCE on Windows from Linux Part 4: Keimpx
RCE on Windows from Linux Part 5: Metasploit Framework
RCE on Windows from Linux Part 6: RedSnarf
Cisco Password Cracking and Decrypting Guide
PowerShell Commands for Pentesters
Pure PowerShell Infosec Cheatsheet
Reveal Passwords from Administrative Interfaces
Firebird Database Exploitation
Top 25 Penetration Testing Skills and Competencies (Detailed)
Where To Learn Ethical Hacking & Penetration Testing
Exploits, Vulnerabilities and Payloads: Practical Introduction
Solving Problems with Office 365 Email from GoDaddy
Terminal Escape Injection
Network Security
Menu Toggle
Capture Passwords using Wireshark
Detecting Network Attacks with Wireshark
How to Port Scan a Website
Nmap NSE Library
SSH Sniffing (SSH Spying) Methods and Defense
Security Operations Center: Challenges of SOC Teams
Spaces in Passwords – Good or a Bad Idea?
Why Does Nmap Need Root Privileges?
Solution for SSH Unable to Negotiate Errors
The Onion Router and Privacy
Bug Hunting
Menu Toggle
Bug Bounty Tips
Menu Toggle
Bug Bounty Tips #1
Bug Bounty Tips #2
Bug Bounty Tips #3
Bug Bounty Tips #4
Bug Bounty Tips #5
Bug Bounty Tips #6
Bug Bounty Tips #7
Bug Bounty Tips #8
Bug Bounty Tips #9
Bug Bounty Tips #10
Become a Penetration Tester vs. Bug Bounty Hunter?
Tools
Menu Toggle
Port Scanner in PowerShell (TCP/UDP)
Active Directory Brute Force Attack Tool in PowerShell (ADLogin.ps1)
Windows Local Admin Brute Force Attack Tool (LocalBrute.ps1)
SMB Brute Force Attack Tool in PowerShell (SMBLogin.ps1)
SSH Brute Force Attack Tool using PuTTY / Plink (ssh-putty-brute.ps1)
Default Password Scanner (default-http-login-hunter.sh)
Nessus CSV Parser and Extractor (yanp.sh)
Metasploit
Menu Toggle
Metasploit Module Library
Linux Exploits
Windows Exploits
Payloads
Auxiliary Modules
Post Exploitation Modules
Android Modules
Why your exploit completed, but no session was created?
Why is your Meterpreter session dying?
Glossary
Contact
Support
Metasploit Module Library
Module not found.
For list of all Metasploit modules, visit the
Metasploit Module Library
.