VK9 Security

  • Home
  • Udemy Courses
  • Red Team
    • Anonymity
    • Information Gathering
    • Exploitation
    • Post-Exploitation
      • Cleaning Tracks
    • Red Team Operations
    • Reporting
    • Tools
  • Blue-Team
    • Threat Hunt
    • Incident Response
    • OS
      • Linux OS
      • Windows OS
    • Device Configuration
  • Labs
  • About Us

Tools

  • Introduction – Hacking with BeEF

Vulnerability scanner

  • Nessus How to

Processes

  • How to enumerate services in use with pspy

Password

  • Cracking Password John The Ripper
  • Ssh2john how to
  • Fcrackzip – BruteForce ZIP protected files
  • Create a wordlist using hashcat
  • Password Hash Cracking using Hashcat & John
  • Crunch – How to
  • [Offline] Cracking passwords with Sucrack

DOS

  • LOIC – DoS Attacking Tool – Guide

Network

  • How to use Bettercap 2
Wireless
  • Nothing here yet

Web Application

Enumeration
  • Web Application Tools
  • Nikto – How to
Dir search
  • Cewl – How to
  • Gobuster How to
  • wfuzz How to
  • dirsearch how to
CMS
  • Joomscan how to
  • Magescan how to – Magento
  • How to use WPScan
  • Droopescan – How to use
SQLi
  • Sqlmap how to

Active Directory

  • [How to] Kerbrute
  • [How to] CrackMapExec
  • [How to] Enumerate AD users using Impacket/GetADUsers.py
  • [How to] Pth-ToolKit
  • [How to] ldapdomaundump
  • [How to] windapsearch
  • [How to] xfreerdp
  • [How to] Evil-WinRM: A Tool for Windows Remote Management Exploitation
  • [Active Directory] Dumping credentials with impacket-secretsdump

Vk9 Security