Quantcast
Channel: HACKINGHEART : HACKING DEMYSTIFIED » Exploit writing
Browsing latest articles
Browse All 8 View Live

Image may be NSFW.
Clik here to view.

Hackingheart’s own tool : SystemReporter v1.0

SystemReporter v1.0 Hi guys , hackingheart is back with a two interesting gifts for you . For the first time , we are releasing a small tool named SystemReporter .This is an utility that shows various...

View Article



Image may be NSFW.
Clik here to view.

AllRounder for your Windows 7

AllRounder Hi guys , in this edition , we are giving you a new tool that will allow you to access all operating system’s folder from one point . This is AllRounder , simply download the exe and run...

View Article

Image may be NSFW.
Clik here to view.

Exploit Pack – An open source security framework

Exploit Pack is an open source security framework developed by Juan Sacco. It combines the benefits of a Java GUI, Python as Engine and well-known exploits on the wild. It has an IDE to make the task...

View Article

Image may be NSFW.
Clik here to view.

winAUTOPWN – Vulnerability Testing on Windows

winAUTOPWN and bsdAUTOPWN are minimal Interactive Frameworks which act as a frontend for quick systems vulnerability exploitation. It takes inputs like IP address, Hostname, CMS Path, etc. and does a...

View Article

Image may be NSFW.
Clik here to view.

Finally Google Chrome gets hacked at Pwn2Own

Vupen Security and Sergey Glazunov independently managed to penetrate Google Chrome’s security defenses at the Pwn2Own and ‘Pwnium’ contests respectively. The annual competition, which invites ethical...

View Article


Image may be NSFW.
Clik here to view.

Fuzzers – The Fault Injectors

Friends sorry as i could not post regularly in this blog. I was very busy conduction summer training on Ethical Hacking. Then i remain busy with my new Ethical Hacking training center that i opened in...

View Article

Image may be NSFW.
Clik here to view.

Real-World Security Tests Using Metasploit

Architecture of the Metasploit”. The Ruby -based Metasploit was designed to be a robust exploit development system. It just so happens that you can use it to run previously developed exploits against...

View Article

Image may be NSFW.
Clik here to view.

Metasploit Architecture Part – 2

Hi,This post is in continuation of my first post “Metasploit Architecture” . Module Locations Primary Module Tree Located under /opt/framework/msf3/modules/ User-Specified Module Tree Located under...

View Article

Browsing latest articles
Browse All 8 View Live




Latest Images