Tagged articles
13 articles
Page 1 of 1
Black & White Path
Black & White Path
May 9, 2026 · Information Security

AutoPentestX: An Automated Linux Penetration Testing Toolkit for Faster Red‑Team Assessments

AutoPentestX is an open‑source, Linux‑focused automated penetration testing framework that integrates tools like Nmap, Nikto, SQLMap and Metasploit into a single command workflow, stores results in SQLite, generates detailed PDF reports, and includes installation, usage instructions, legal compliance notes, and future development plans.

Metasploitautomationlinux
0 likes · 7 min read
AutoPentestX: An Automated Linux Penetration Testing Toolkit for Faster Red‑Team Assessments
Black & White Path
Black & White Path
May 4, 2026 · Information Security

Metasploit New Modules: DHCP Exhaustion + DNS MITM for Internal Network Takeover

The article explains how Metasploit’s new auxiliary modules—dhcp_exhaustion/exhaust and dns_mitm/dns_mitm—can be combined to exhaust a DHCP server’s address pool, impersonate it, and redirect DNS queries to a malicious server, enabling attackers to gain network control while outlining defensive measures such as DHCP snooping and ARP inspection.

DHCP exhaustionDNS hijackingMetasploit
0 likes · 4 min read
Metasploit New Modules: DHCP Exhaustion + DNS MITM for Internal Network Takeover
Black & White Path
Black & White Path
Feb 23, 2026 · Information Security

PentAGI: AI‑Powered Penetration Testing Platform Integrates 20+ Tools to Redefine Security Assessments

PentAGI is an open‑source, AI‑driven penetration testing platform released by VXControl in early 2025 that automatically orchestrates over twenty security tools—including Nmap, Metasploit, sqlmap—and generates comprehensive reports within isolated Docker environments, offering advanced agent architecture, real‑time intelligence gathering, and scalable deployment options.

AI penetration testingDockerLLM
0 likes · 5 min read
PentAGI: AI‑Powered Penetration Testing Platform Integrates 20+ Tools to Redefine Security Assessments
DevOps Operations Practice
DevOps Operations Practice
Jul 11, 2024 · Information Security

Top 7 Penetration Testing Tools and Their Key Features

This article introduces seven leading penetration testing tools—including Kali Linux, Metasploit, Wireshark, Nmap, Burp Suite, Acunetix, and Nessus—detailing their primary features and how they help security professionals identify and mitigate vulnerabilities effectively.

Burp SuiteKali LinuxMetasploit
0 likes · 9 min read
Top 7 Penetration Testing Tools and Their Key Features
MaGe Linux Operations
MaGe Linux Operations
May 21, 2023 · Information Security

Step‑by‑Step Webshell Upload and Kernel Privilege Escalation on Ubuntu 16.04

This tutorial walks through setting up an Ubuntu 16.04 vulnerable environment, gathering information, uploading a webshell via MySQL into outfile or log injection, establishing a reverse shell with Metasploit, and finally exploiting CVE‑2021‑4034 for kernel privilege escalation, while also covering post‑exploitation persistence techniques.

KaliMetasploitWebshell
0 likes · 10 min read
Step‑by‑Step Webshell Upload and Kernel Privilege Escalation on Ubuntu 16.04
MaGe Linux Operations
MaGe Linux Operations
Sep 20, 2022 · Information Security

Top 10 Essential Tools Every Ethical Hacker Must Use

Discover the ten most widely used security tools—from Nmap and Nessus to Metasploit—that ethical hackers rely on for network mapping, vulnerability scanning, wireless analysis, and automated exploitation, each with key features, platform support, and practical applications for strengthening defenses.

Metasploitethical hackingnessus
0 likes · 7 min read
Top 10 Essential Tools Every Ethical Hacker Must Use
ITFLY8 Architecture Home
ITFLY8 Architecture Home
May 9, 2018 · Information Security

Master MySQL Penetration: From Recon to Privilege Escalation

This article details comprehensive MySQL penetration techniques, covering information gathering, password cracking, webshell deployment, and multiple privilege‑escalation methods using tools such as Nmap, Metasploit, sqlmap, MOF, UDF and startup script exploits.

Information GatheringMetasploitSQLMap
0 likes · 25 min read
Master MySQL Penetration: From Recon to Privilege Escalation