Make Cool linux Terminal Header
you want your terminal to be customized with awesome script every time you fire it up, huh?! Well, look no
Learn ethical hacking , cyber security, computer programming, networking, android tricks and windows tricks.
you want your terminal to be customized with awesome script every time you fire it up, huh?! Well, look no
L3MON is a remote Android management suite, we can use it to gain access on any android smartphone. In easy
The information security environment has changed vastly over the years. Now, in spite of having security policies, compliance, and infrastructure security
Even though there are already many tools available through the right-click context-menu in Windows, some users still desire more tools
Have you ever wondered how cool it would be to have your own A.I. assistant? Imagine how easier it would
A zero-day vulnerability, at its core, is a flaw. It is an unknown exploit in the wild that exposes a
It is a post-exploitation tool capable to maintain access to a compromised web server for privilege escalation purposes. The obfuscated
Once a hacker has created a PowerShell payload to evade antivirus software and set up msfconsole on their attack system, they
Hackers are always seeking zero-day exploits that can successfully bypass Windows 10’s security features. There has been extensive research into creating undetectable malware and
There may come a time where you have an extra wireless router on your hands (such as the Linksys WRT54GL) that
There are a lot of attacks that can be performed to a server when it’s not correctly configured or doesn’t
Most of web administrators that doesn’t care properly about the security of the servers, are often target of attacks that
HULK is a Denial of Service (DoS) tool used to attack web servers by generating unique and obfuscated traffic volumes.
Hydra is a pre-installed tool in Kali Linux used to brute-force username and password to different services such as ftp,
DDoS stands for Distributed Denial of Service. This is a cyber-attack in which the attacker floods the victim’s servers with
I F T T T is short for If This Then That. Using IFTTT you can easily automate WordPress to
Making a bot to fix indentation error in python. fixing: IndentationError: unexpected There are times when you need to press
We are going to show you how to make a persistent backdoor. Once you exploit some android device just do
Want to use Selenium to scrape with Chrome on Windows? Let’s do it! We’ll need to install a couple things: Selenium, which
USB Rubber Ducky — a device which resembles a regular USB flash drive. When connected to a computer, it claims
A simple script that can be used for spamming specific person or group on Whatsapp. This code is written in
Sometimes, during security audits, we may encounter a situation where everything is being managed correctly. In other words security patches, policies,
Without admin privileges, installing additional software, or modifying the Windows 10 firewall, an attacker can alter a router and perform
Compromised uTorrent clients can be abused to download a malicious torrent file. The malicious file is designed to embed a
The tactic of brute-forcing a login, i.e., trying many passwords very quickly until the correct one is discovered, can be
Having an efficient workflow is an integral part of any craft, but it’s especially important when it comes to probing
Nikto is a free software command-line vulnerability scanner that scans webservers for dangerous files/CGIs, outdated server software and other problems.
There are many ways you can customize your Mac OS X terminal. One way I customize my terminal was by
Learn Termux for hacking !! first, understand what is Termux and follow how to install applications using Termux and the complete Termux command. In this article, I
you want your terminal to be customized with awesome script every time you fire it up, huh?! Well, look no
This is a tutorial explaining how to hack android phones with Kali. I can’t see any tutorials explaining this Hack/Exploit,
A dead man’s switch is a switch that is designed to be activated or deactivated if the human operator becomes
After a hacker has configured Metasploit on a remote private server, created a resource script for automation, and created a simple
Recently I was trying to install Kali Live on a USB drive with persistence and struggled to find a tutorial
It’s easy to run Kali Linux from a live USB on nearly any available computer, but many publicly accessible laptops and
Kali Linux is known as being the de facto penetration-testing Linux distribution but can be a pain to use as
Recently, someone asked how to make your own “Evil USB,” and I promised to make a how-to on this topic.
Deleted bank statements and private photos are still within an attacker’s grasp, so don’t think that emptying your recycling bin
Using a keylogger to intercept keys pressed on an infected computer can circumvent encryption used by email and secure chat
The microphone in a Windows computer is accessible to most applications running on the device at all times and completely
A powered-off Windows 10 laptop can be compromised in less than three minutes. With just a few keystrokes, it’s possible
Encrypting payloads and encoding stagers are more effective against macOS than one might think. It’s very easy to evade VirusTotal
Complex shell scripts can be implanted into photo metadata and later used to exploit a MacBook. In addition to obfuscating
According to the dictionary meaning, a hacker is any person who usually has extraordinary computer skills and uses his knowledge
In the penetration testing journey we must learn how to brute force attack. But the success of brute force attack
Install : pip install proxylist pip install mechanize Usage: BruteForce Gmail Attack python3 Brute_Force.py -g Account@gmail.com -l File_list python3 Brute_Force.py
uDork is a script written in Python that uses advanced Google search techniques to obtain sensitive information in files or directories, find