Hackercool Magazine Simplifying Cyber Security
- Beginners guide to PowerSploitby Anamar Taknev on February 20, 2025 at 11:30 am
Hello, aspiring ethical hackers. In our previous blogpost, you learnt what is Post-Exploitation and various techniques of Post exploitation. In this article, you will learn about PowerSploit, a Post-exploitation framework. PowerSploit is a collection of Microsoft PowerShell modules that help Red Teamers and Penetration testers during post exploitation phase of pen testing. Let’s learn how The post Beginners guide to PowerSploit appeared first on Hackercool Magazine.
- Beginners guide to Nishangby Anamar Taknev on February 19, 2025 at 11:02 am
Hello, aspiring ethical hackers. In our previous blogpost, you learnt about Post-exploitation in detail. In this article, you will learn about Nishang, a post-exploitation framework. Nishang post-exploitation framework is a collection of PowerShell scripts and payloads that aids us in penetration testing and red teaming. Nishang can be useful in all the phases of penetration The post Beginners guide to Nishang appeared first on Hackercool Magazine.
- Beginners guide to Uniscanby Anamar Taknev on February 13, 2025 at 11:30 am
Hello, aspiring ethical hackers. In our previous blogposts, you learnt about various vulnerabilities affecting web apps and websites like Local File Inclusion (LFI), Remote File Inclusion (RFI) and remote command execution (RCE) vulnerabilities. In this blogpost, you will learn about Uniscan, a web vulnerability scanner that scans and detects the above mentioned vulnerabilities in a The post Beginners guide to Uniscan appeared first on Hackercool Magazine.
- Complete guide to Stegseekby Anamar Taknev on February 12, 2025 at 11:12 am
Hello, aspiring ethical hackers. In our previous blogposts, you learnt what is steganography, its uses and how to hide secret data in an image using the tool Steghide. In this blogpost, you will learn about a tool that can retrieve this hidden data from an image. The tool’s name is Stegseek. Although the working of The post Complete guide to Stegseek appeared first on Hackercool Magazine.
- Complete guide to Stegcrackerby Anamar Taknev on February 5, 2025 at 11:40 am
Hello, aspiring ethical hackers. In our previous blogposts, you learnt what is steganography, it’s uses and how to hide secret data in an image using the tool Steghide. In this blogpost, you will learn about a tool that can retrieve hidden data from an image. The tool’s name is Stegcracker. Stegcracker is a steganography brute-force The post Complete guide to Stegcracker appeared first on Hackercool Magazine.
- Beginners guide to Ophcrackby Anamar Taknev on February 5, 2025 at 11:08 am
Hello, aspiring ethical hackers. In our previous blogpost, you learnt about password cracking. In this article, you will learn about a tool that cracks Windows log-in passwords offline. The name of this tool is Ophcrack. Ophcrack is a free, open-source program that uses rainbow tables to crack Windows log-in passwords. It can import hashes in The post Beginners guide to Ophcrack appeared first on Hackercool Magazine.
- Beginners guide to PHPSploitby Anamar Taknev on February 1, 2025 at 6:45 am
Hello, aspiring ethical hackers. In our previous blogpost, you have learnt what is backdoor. In this blogpost, you will learn about PHPSploit, a backdoor for web servers. PHPSploit is a fully featured command & control (C&C) framework that is used for persistence on web servers after gaining access. Let’s see how PHPSploit works and learn The post Beginners guide to PHPSploit appeared first on Hackercool Magazine.
- Beginners guide to Socatby Anamar Taknev on January 17, 2025 at 9:12 am
Hello, aspiring ethical hackers. In our previous blogpost, you learnt how to use netcat for various purposes in ethical hacking. In this blogpost, you will learn about another such tool named Socat. Socat, shortcut for SOcket CAT is a command line utility that enables bidirectional data transfer between two independent data channels. Actually, it can The post Beginners guide to Socat appeared first on Hackercool Magazine.
- Beginners guide to msfpcby Anamar Taknev on January 17, 2025 at 8:36 am
Hello, aspiring ethical hackers. In our previous blogpost, you learnt how to create payloads with msfvenom. In this blogpost, you will learn about MSFPC (MSFvenom payload creator), a tool that simplifies generation of Metasploit payloads with msfvenom. MSFvenom payload creator (MSFPC) is a wrapper to generate multiple types of payloads based on users choice. The The post Beginners guide to msfpc appeared first on Hackercool Magazine.
- Complete guide to Wapitiby Anamar Taknev on January 9, 2025 at 12:31 pm
Hello, aspiring ethical hackers. In our previous blogpost on web application hacking and web server hacking, you learnt about various web vulnerabilities. In this blogpost, you will learn about Wapiti a web vulnerability scanner. It is a very good practice to learn about the vulnerabilities and weaknesses in a website or web application before they The post Complete guide to Wapiti appeared first on Hackercool Magazine.