TAG

Security

Steps to embed payload in PDF [100% Working]

step by step instructions to embed payload in pdf to attack a windows system. Get backdoor access to windows system by exploiting a pdf file

By kennedymuthii · 6 min read · Ethical hacking

BEeF Hacking Framework Tutorial [5 Easy Steps]

Step by step instructions to use beef hacking framework with example. Beef hacking framework is a powerful tool that can be leveraged by systems security …

By kennedymuthii · 6 min read · Ethical hacking

Learn hacking with Metasploitable 2 [Step-by-Step]

Step by step beginners guide exploit remote services in Linux using Metasploitable 2 and Kali Linux. We learn to exploit samba server, ftp server on port 21 and …

By kennedymuthii · 6 min read · Kali Linux