Practical Antivirus Evasion – BETA VERSION | Pentest Magazine.
Hacker Hat Colors Explained: Black Hats, White Hats, and Gray Hats.
How to Scan a Vulnerable Windows Machine | Latest Hacking News.
Here is a basic keylogger script for beginners to understand the basics of how keylogging works in notepad. This script should be used for research purposes only. via How to create a keylogger in notepad | Latest Hacking News.
Common Security Weaknesses that Hackers Target | Latest Hacking News. Information security professionals should know the common security weaknesses that hackers and malicious users first check for when hacking into computer systems. Security flaws, such as the following, should be on your checklist when you perform your security tests: Gullible and overly trusting users Unsecured…
What is John the Ripper? – Definition from WhatIs.com. John the Ripper is a popular open source password cracking tool that combines several different cracking programs and runs in both brute force and dictionary attack modes. John the Ripper is often used in the enterprise to detect weak passwords that could put network security at…
Hack Like a Pro: The Ultimate List of Hacking Scripts for Metasploit’s Meterpreter « Null Byte. Metasploit framework is an incredible hacking and pentesting tool that every hacker worth their salt should be conversant and capable on.
lazykali script for kali linux is awesome. LazyKali Script! A very good script posted by “darkc0d3” on the Top-Hat Sec Forum for updating your Kali Linux. YouTube: http://www.youtube.com/watch?v=38PXNJpIwck Download: http://code.google.com/p/lazykali/
Pass the Hash toolkit, Winexe | Kali Linux.
PENETRATION-TESTING via Passing the Hash with Remote Desktop | Kali Linux. Kali Linux contains a large number of very useful tools that are beneficial to information security professionals. One set of such tools belongs to the Pass-the-Hash toolkit, which includes favorites such as pth-winexe among others, already packaged in Kali Linux.