![Post Exploitation tool in kali linux Weevely TechArry](https://techarry.com/wp-content/uploads/2023/08/Post-Exploitation-tool-in-kali-linux-Weevely-300x300.jpg)
Weevely is a stealth backdoor or PHP web shell that simulate telnet-like connection. This tool is used for post exploitation of vulnerability in web application. Syntax weevely generate <password> <file path> In this article we will do post exploitation of... Read more
![Essential Nmap Commands in Kali Linux TechArry](https://techarry.com/wp-content/uploads/2023/07/Essential-Nmap-Commands-in-Kali-Linux-300x300.png)
NMAP, short for Network Mapper, is an essential and powerful network scanning tool available in Kali Linux. With its extensive range of features and flexibility, Nmap has become the go-to tool for network administrators, security professionals, and ethical hackers alike.... Read more