Skip to content
Cyber Security World | Hacking Courses | Secure yourself online
Home
Tools
Technology
Fun
Cyber Security – Certificate IV
Videos
Blog
Home
Tools
Technology
Fun
Cyber Security – Certificate IV
Videos
Blog
Cyber Security World | Hacking Courses | Secure yourself online
Main Menu
Search for:
Search
Search
Blog
Cyber Security – Certificate IV
Menu Toggle
BSBINS401 Analyse and present research information
BSBWHS309 Contribute effectively to WHS communication and consultation processes
ICTCLD401 Configure cloud services
ICTPRG435 Write scripts for software applications
VU23213 Utilise basic network concepts and protocols required in cyber security
VU23215 – Test concepts and procedures for cyber security
VU23217 Recognise the need for cyber security in an organisation
VU23218 Implement network security infrastructure for an organisation
VU23219 Manage the security infrastructure for an organisation
VU23221 Evaluate and test an incident response plan for an enterprise
VU23223 Apply cyber security legislation, privacy and ethical practises
VU23225 Investigate Windows security features
Detailed Report on “VU23225 Investigate Windows Security Features – Lesson 01
Detailed Report on “VU23225 Investigate Windows Security Features – Lesson 02
Detailed Report on “VU23225 Investigate Windows Security Features – Lesson 03
Detailed Report on VU23225 Investigate Windows Security Features – Lesson 04
Detailed Report on VU23225 Investigate Windows Security Features – Lesson 05
Detailed Report on VU23225 Investigate Windows Security Features – Lesson 06
Detailed Report on VU23225 Investigate Windows Security Features – Lesson 07
Fun
Menu Toggle
Wireless Power: Tesla’s Vision of the Future
Home
Technology
Menu Toggle
Gennaris Restoring Vision with AI!
How to hack a WIFI network and how to secure your WIFI
Latest Feature of Samsung S25 Ultra
Latest Feature of Samsung S25 Ultra 8 3 2025
Latest Features iPhone 16 Pro
Live Translate Phone Calls Samsung Phones
What is Quantum Computing Explained Simply for Beginners
Tools
Menu Toggle
1. Information Gathering Tools
1. Nmap
10. Netdiscover
2. Zenmap
3. theHarvester
4. Maltego
5. Shodan
6. dnsenum
7. dnsrecon
8. Dmitry
9. Whois
10. Forensics Tools
1. Autopsy
2. Binwalk
3. Foremost
4. Sleuth Kit
5. Volatility
11. Reverse Engineering Tools
1. Ghidra
2. IDA Pro
3. Radare2
4. OllyDbg
5. APKTool
12. Stress Testing Tools
1. Slowloris
2. LOIC (Low Orbit Ion Cannon)
3. HOIC (High Orbit Ion Cannon)
13. Hardware Hacking Tools
1. Arduino
2. RFIDIOt
3. USB Rubber Ducky
14. Reporting Tools
1. Dradis
2. Faraday
3. KeepNote
15. Remote Access Tools
1. SSH (OpenSSH)
2. VNC
3. Remmina
16. Vulnerability Exploitation Tools
1. Exploit Database
2. SearchSploit
17. OSINT Tools
1. SpiderFoot
2. Recon-ng
3. Metagoofil
18. Privilege Escalation Tools
1. LinPEAS
2. WinPEAS
3. Linux Exploit Suggester
19. Mobile Pentesting Tools
1. Drozer
2. APKTool
3. MobSF (Mobile Security Framework)
2. Vulnerability Analysis Tools
1. Nessus
2. OpenVAS
3. Nikto
4. Wapiti
5. Golismero
20. Cloud Pentesting Tools
1. Pacu
2. ScoutSuite
3. CloudSploit
21. Red Team Tools
1. BloodHound
2. CrackMapExec
3. Responder
22. Exploit Development Tools
1. GDB (GNU Debugger)
2. pwntools
3. ROPgadget
4. NASM
23. Password Attack Tools
1. CeWL
2. John the Ripper
3. Hashcat
4. THC Hydra
24. Container and Kubernetes Security Tools
1. kube-hunter
2. Trivy
25. Metasploit Framework Tools
1. msfconsole
2. msfvenom
3. Exploit Modules
4. Payload Modules
5. Auxiliary Modules
6. Post Modules
7. Meterpreter
8. Armitage
3. Web Application Analysis Tools
1. Burp Suite
2. OWASP ZAP
3. W3af
4. SQLmap
5. Commix
6. Dirb
7. Ffuf
4. Password Attacks Tools
1. John the Ripper
2. Hashcat
3. Hydra
4. CeWL
5. Medusa
6. Patator
5. Wireless Attacks Tools
1. Aircrack-ng
2. Fern Wifi Cracker
3. Reaver
4. Kismet
5. Wifite
6. Exploitation Tools
1. Metasploit Framework
2. BeEF (Browser Exploitation Framework)
3. Armitage
7. Social Engineering Tools
1. Social-Engineer Toolkit (SET)
2. BeEF (Browser Exploitation Framework)
3. PhishingFrenzy
4. King Phisher
8. Sniffing and Spoofing Tools
1. Wireshark
2. Ettercap
3. Bettercap
4. Responder
5. dsniff
6. ARP-Spoof
9. Post-Exploitation Tools
1. Metasploit Meterpreter
2. Empire
3. Cobalt Strike
4. WinPEAS / LinPEAS
5. PowerSploit
Hack into a Windows 10
How to Hack Windows 11 Using osk.exe (On-Screen Keyboard Exploit)
How to Install Windows 11 ISO on VMware Workstation (Step-by-Step Guide)
How to Use BitLocker to Encrypt Your Windows Hard Drive and Protect Your PC from Hackers
How to Use Rufus to Create a Bootable USB for Windows 10
Preparing Your Kali Linux Environment for Penetration Testing
Trace back a Hacker
Trace back a hacker – Part 1 of 2 – Gather Information
Trace back a hacker – Part 2 of 2 – Analysis
فيروس FleshStealer كيف تحمي نفسك
🎥How to Bypass Microsoft Account Sign-In on Windows 11 Setup (Use Local Account Instead)
Home
»
Tools
»
9. Post-Exploitation Tools
9. Post-Exploitation Tools
Post-Exploitation Tools
: These are used after successfully exploiting a system to gather additional information, escalate privileges, maintain access, or move laterally within a network.
1. Metasploit Meterpreter
2. Empire
3. Cobalt Strike
4. WinPEAS / LinPEAS
5. PowerSploit
Scroll to Top