Skip to content
Security Tutorials

Security Tutorials

Keeping Cyber Security Simple

  • Hacking Basics
  • Expliots & Pentesting
  • General Admin Tasks
  • Networking
  • Hacking Wireless Networks
  • Whoami
Security Tutorials

Category: Expliots & Pentesting

Magic Unicorn V 2.0 PowerShell Downgrade Attack

11th September 2015 hemp Expliots & Pentesting

Magic Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory based on[…]

Read more

Using Microsoft Tools To Dump Password Hashes

8th September 2015 hemp Expliots & Pentesting

Surprisingly Microsoft supplies you the tools that allow you to dump the lsass.exe and then you can use Mimikatz on[…]

Read more

Posts navigation

«Previous Posts 1 2 3

Categories

  • Expliots & Pentesting
  • General Admin Tasks
  • Hacking Basics
  • Hacking Wireless Networks
  • Networking
  • Raspberry Pi

Archives

Popular Tutorials

  • Secure Shell (SSH)
  • Creating a Simple HTTP Server with one line of Python
  • Brute Forcing Web Logins with DVWA
  • Top 10 Security YouTube Channels

Mission Statement

Security Tutorials Mission is to create clear up to date tutorials on hacking, cyber security, PCI Compliance.

Please Subscribe to Security Tutorials to receive notifications of new tutorials as they are released.

Tweets by sectutorials
WordPress Theme: Poseidon by ThemeZee.