Really cool seeing a fellow cyber specialist. There aren't a lot of us. Cyber security is some spooky shit. I'm a greenhorn but your video is helping me to be less of a greenhorn lmao. Mad respect for helping out, not very many cyber specialists want to reveal their secrets lmao.
Thanks for the tutorial. You didn't show the most important part of this tutorial which is showing us how to run an exploit from exploitDB. Instead, you wasted a whole 5 minutes talking about how you prepared for the tutorial. :-D :-D :-D
If I'm not wrong searchsploit -m 1234.py (or any other exploit no.) will mirror the exploit to your current working directory. The -m stands for mirror i think.
hi hackersploit i need help. i have created android reverse tcp payload, when i exploit my android device on msfconsole it shows this message: negotiated tlv encryption
u can hack wifi with many pentesting tools like wifite fluxion aircrack-ng airgedon and many more happy hunting and i am not responsible for any thing happens thanks ...... Expect us......
PLEASEEEE just get to the POINT !!! Please avoid status update, apologies, repeating the same sentences again and again...... With this bugs sorted out, your teaching program will be perfect
Tutorial starts at 5:25
Thanks
Thank gawd.
TY
Thank you for also explaining how to load the exploits into Metasploit. Was searching for that as searchsploit usage itself is kinda obvious.
Great idea with the website. Still loving the channel. Daily uploads will dilute the work imo.
Best channel to learn pentesting
unique man!
Really cool seeing a fellow cyber specialist. There aren't a lot of us. Cyber security is some spooky shit.
I'm a greenhorn but your video is helping me to be less of a greenhorn lmao. Mad respect for helping out, not very many cyber specialists want to reveal their secrets lmao.
do you know of any places that have more recent techniques im trying to learn. and i know things are changing out here
Great video. What would be helpful would be a video on how to use the exploit once we have it on our computer.
Yassss :D
Your videos always teach me new things
BRO very nice, I like you...
pls make more videos on ctf challenges.
Video starts at 4:04
Great video! Most video like this with Real examples Will be great.
I love your channel so much, such an awesome man you are.
Thank you very much
Incredible video and channel. You are a great teacher.
U BEST, and i want learn cybersecurity on univerity. i am from ukraine.
Exploit Database is perfect
create a video about cracking a school network ;) will have many views
nice video like always . keep it like this ahmed
First viewer . Love your videos
Thank you
Thanks for the tutorial. You didn't show the most important part of this tutorial which is showing us how to run an exploit from exploitDB. Instead, you wasted a whole 5 minutes talking about how you prepared for the tutorial. :-D :-D :-D
No wonder everyone was asking me to watch this video before I can start the exploit.
Thanks HS
2nd viewer, biggest fan of you alexis
Thank you
No, Thank You Sir , for your wonderful videos
i am a huge fan of your's alexis.
Please make some videos about reverse engineering.
Thank You!
well done, sir.
If I'm not wrong searchsploit -m 1234.py (or any other exploit no.) will mirror the exploit to your current working directory. The -m stands for mirror i think.
3:00 start of content
Thanks a lot! This was really interesting to learn.
666th like and 66th comment #FeelsGoodMan
how to excute the exploit after finding with searchsploit ? share a link for a video please
ur the best
one or two videos a week will be good bro....
Can you also let us know how can we make use of this exploit ? that you showed last in your video. I mean how can we execute it ?
Remarkable!
You are Marvelous
Why do you use kali linux instead of parrot os?
Thankyou sir but I don't know how to launch these exploits kindly teach us how to use these exploits
What is the usual stuff you do before you launch an exploit?
find vulnerabilities (manually or with scanners)
my version doesn't show the exploitdb path
Hi, there is a method for create an output report file?
thk
Reverse engineering protocol ?
how can i export the exploitDB exploits and put to the MSF db to work with? Please guide. I like your videos.
Ummm why i didnt see any path /usr/share/exploitdb
In searchsplot?
Can someone help me...... 🙏
Great
HackerSploit, do you think you could potentially upload a series of exploring the Deep Web?
Toast. He did
Hey there
Hello
😃😃😄😄
i only have one question why does he not just touch textfile.txt and then nano textfile.txt and write in there
please create tutorial for open vas that will used to login and scan the internal feature of the web application
He already did that
Why dont you upload how to play in hack.me .. its web app hackable . They make it as challenge for hacker
Hey hackersploit do you offer one and one coaching
Yes. hackersploit@protonmail.com
HackerSploit sent u email
Like it cool
I am suffering with a case of ethical hacking I should been studying cybersecurity it is haaaaaard hahahahaha
When I cp the /usr/share/exploitdb/exploits why does it not appear on my ls /root/desktop?
Zuight ur not root user instead do /home/“username”/Desktop
hi hackersploit i need help. i have created android reverse tcp payload, when i exploit my android device on msfconsole it shows this message: negotiated tlv encryption
what should i do
wait i need website to train my skills how are you using this one
use vulnweb
Sir is there any way to search all those anti-exploit s and prevent them 🤔?😍🇧🇩
Yes . Openvas might help
@@8080VB than u for ur great info
how to use those exploits
???
1049 packages that arent video related deff need updates lolol
Check out the -p flag
Thank you HackerSploit. Please how do I install searchsploit on windows.
How to hack any kind of WiFi
u can hack wifi with many pentesting tools like wifite fluxion
aircrack-ng airgedon and many more happy hunting and i am not responsible for any thing happens thanks ...... Expect us......
Muruli Krishna.N aircrack-ng you skid
Fluxion is the easiest for users that are not experts
How much talking before he gets to the point?!
i am the first view
PLEASEEEE just get to the POINT !!!
Please avoid status update, apologies, repeating the same sentences again and again......
With this bugs sorted out, your teaching program will be perfect