Don't get me wrong, i like using a virtual machine or live CD of Kali as much as the next guy. But, at a certain point, it just becomes too long of a process, and so you decide(usually) to just run Kali as your native OS, or you get a separate machine for Kali. I prefer this o ...more
m4r10's Popular Posts
I have recently got a raspberry pi zero w. I did this to try and use its USB slave functionality and do things like HID attacks and grab cookies and such with poison tap. I cannot, no matter how hard i try, get duck berry pi to work. I would be very grateful if someone could m ...more
We all love using pre-made word lists, but every now and again, i feel like making a change. So, i decided to make a little program that generates passwords from a given set of characters and a given length, and places them into a text file to use. So, let's get on with it! S ...more
I would like to tunnel a meterpreter session over an existing ssh connection that i have already established using paramiko in python. I have found a program called meterssh, but don't think it would do what i want, and am i bit confused by the code :P Any help?
Hi, I was looking for some password retrieval tools for post exploitation that are less well known than things like mimikatz and something that doesn't necessarily flag antivirus straight away, when i came across a tool called laZagne, which comes as a .py file and as a binary ...more
I'm trying to make a password reset utility and I think that the easiest way is to run the net user command on a specified user. I am thinking about making an iso that asks you to select a user, and then runs a command for windows to reset it. Does anyone know how i could do t ...more
If an exploit only works on a lan, and not a wan(internet), but does result in code execution and a shell, is it classes as remote code execution?