Cybersecurity Resource Center

Is it Possible to Install Metasploit on the iSH app?

Have you ever wondered whether it’s possible to run Metasploit on the iSH app on iPhone? Well, we took a look to see what was possible, and here are our results:
Is it Possible to Install Metasploit on the iSH app?

Linux Privilege Escalation: Polkit pkexec Pwnkit – CVE-2021-4034

Privilege escalation on any operating system tends to be quite situational. However, the latest privilege escalation exploit on Linux appears to be a game changer in terms of gaining root access on Linux systems.
Linux Privilege Escalation: Polkit pkexec Pwnkit - CVE-2021-4034

Windows Hacking: Reconnaissance Tools

Knowing who is an admin on Windows systems as well as where they are logged on is an important start to hacking an Active Directory environment.
Windows Hacking: Reconnaissance Tools

Beginner Cybersecurity Questions: Career Edition

Interested in Cybersecurity? Take a look at some of our views on the cybersecurity field!
Beginner Cybersecurity Questions: Career Edition

Kali Linux on Android: Using NetHunter Rootless

Interested in having a mobile version of Kali on your Android phone? Take a look at our video to see how to do it using NetHunter Rootless!
Kali Linux on Android: Using NetHunter Rootless

Bypassing Antivirus: Using Veil Evasion

Even though Veil is a tool that has been out for some time, it’s still useful to see how it can be used to bypass antivirus solutions.
Bypassing Antivirus: Using Veil Evasion

Log4J Vulnerability: Fun with Java Exploitation

With all the fuss about the Log4J vulnerability, I thought I’d make a video explaining it at a high level and demonstrating an exploit on the vulnerability. Take a look!
Log4J Vulnerability: Fun with Java Exploitation

iPhone Hacking: Command and Control with the Empire Framework

In my last iPhone video, we looked at how we can get a reverse shell from the iSH app on iPhone. This limited us to the Linux environment that the iSH app gives you.
iPhone Hacking: Command and Control with the Empire Framework

Netcat Reverse Shells: iPhone and iSH

I couldn’t create a Android hacking video without doing an accompanying iPhone hacking video as well! Let’s see how we can demonstrate the use of reverse shells with an iPhone and the iSH app!
Netcat Reverse Shells: iPhone and iSH