VK9 Security

  • Home
  • Courses (Soon)
  • Red Team
    • Anonymity
      • Anonymity
    • Information Gathering
      • Active Gathering
      • Passive Gathering
    • Exploitation
      • Android Exploitation
      • Linux Exploitation
      • Windows Exploitation
      • Network
      • Application
        • Web Exploitation
    • Post-Exploitation
      • Linux Post-Exploitation
      • WIndows Post-Exploitation
      • Cleaning Tracks
    • Red Team Operations
    • Reporting
    • Tools
  • Blue-Team
    • Threat Hunt
    • Incident Response
    • OS
      • Linux OS
        • Linux Management
        • Linux Commands
        • Linux Misc
      • Windows OS
        • Windows Commands
        • Windows Misc
        • Windows Management
    • Device Configuration
  • Labs
    • Labs
  • About Us

Tools

  • Introduction - Hacking with BeEF

Vulnerability scanner

  • Nessus How to

Processes

  • How to enumerate services in use with pspy

Password

  • Cracking Password John The Ripper
  • Ssh2john how to
  • Fcrackzip - BruteForce ZIP protected files
  • Create a wordlist using hashcat
  • Password Hash Cracking using Hashcat & John
  • Crunch - How to
  • [Offline] Cracking passwords with Sucrack

DOS

  • LOIC - DoS Attacking Tool - Guide

Network

  • How to use Bettercap 2
Wireless
  • Nothing here yet

Web Application

Enumeration
  • Web Application Tools
  • Nikto - How to
Dir search
  • Cewl - How to
  • Gobuster How to
  • wfuzz How to
  • dirsearch how to
CMS
  • Joomscan how to
  • Magescan how to - Magento
  • How to use WPScan
  • Droopescan - How to use
SQLi
  • Sqlmap how to

Active Directory

  • [How to] CrackMapExec
  • [How to] Enumerate AD users using Impacket/GetADUsers.py
  • [How to] Pth-ToolKit
  • [How to] ldapdomaundump
  • [How to] windapsearch
  • [How to] xfreerdp
  • [How to] Evil-WinRM: A Tool for Windows Remote Management Exploitation

Vk9 Security