25 comments on “HOME

  1. Amazing blog..
    Pls do not stop writing… Kudos to you…Can you write about some vulnerable VMimage/distros of networking on which we can practice VAPT at home?

    Gos bless you..

    • Thank u for your support Samindra. There is already one “Metasploitable tutorials” series going on my website. Feel free to follow it.

  2. Great blog alot of useful information, i love that u explain everything in detail. your latest post talks about cypher have u thought about doing 1 on the veil framework, there are similarities between them but veil offers more options. I’m having a bit of trouble understanding it. Can you do a post for it? i created a keylogger and i want to make it undetectable to an anti-virus by encrpyting and obfuscating the code but i also want to have it as a .exe to distribute it is there any advice u can offer on how to move forward?

  3. hi guys at present i cant understand your terminologies……hope ican understand them very soon….

    • @Sai Samanth, Like your spirit. Keep practising and always leave a comment if you need any help.

      • @kanishka10 ..i have just gone through your hacking fb using desktop phishing …it was good..but when i opened your vpn link it asked me to buy it….will u please suggest me ..any free of cost vpns

    • @tak0, that’s a tough question to answer. Please follow some of the blogs around including my blog. Then you can settle for one which you are comfortable with.

  4. Hey its buff again, love your blog it is teaching me alot. I have a question regarding how to bind two processes together but still have functionality of both. To better explain i want to bind a keylogger.exe to a chrome.exe setup file. Is there a way to do this while both exes are functioning. This is for a project for my cybersecurity master

  5. Great magazine, though I’m having a small issue, regsvr32_applocker_bypass_server.rb is not in my exploits, therefore I cannot use the command “use exploit/windows/misc/regsvr32_applocker_bypass_server” however I did find the GitHub for the file. So I copied the text, pasted it into a new .rb file, and named it as above. But no matter what I do it says “failed to load module”

    • Ah, after further investigation I found that it printed this above everything:

      [-] WARNING! The following modules could not be loaded!
      [-] /usr/share/metasploit-framework/modules/exploits/windows/misc/regsvr32_applocker_bypass_server.rb: Msf::Modules::MetasploitClassCompatibilityError Failed to load module (windows/misc/regsvr32_applocker_bypass_server from /usr/share/metasploit-framework/modules/exploits/windows/misc/regsvr32_applocker_bypass_server.rb) due to Missing compatible Metasploit class constant

      What would one do about this?

      • @Op72, update your metasploit by typing command “msfupdate”. If msfupdate fails, type command “apt-get update” and then retry the command “msfupdate”. It will fix the problem.

Leave a Reply

Your email address will not be published. Required fields are marked *