File Inclusion
File Inclusion is a type of vulnerability in web applications that allows an attacker to include or execute a remote
Learn ethical hacking , networking, social engineering, cyber security, pen-testing, linux, android, windows tricks.
File Inclusion is a type of vulnerability in web applications that allows an attacker to include or execute a remote
Installing Wireless Network Adapter on Kali Linux: Kali Linux is a popular distribution for ethical hacking and penetration testing. In
Cross-site request forgery (CSRF), also known as XSRF, Sea Surf or Session Riding, is an attack vector that tricks a
A reverse shell is a type of session cyber attackers commonly use to open communication ports between their machines and the victims
The tool hosts a fake website which uses an iframe to display a legit website and, if the target allows
Proxychains is a UNIX program that allows us to mask our IP address by redirecting network traffic. It routes our
if you don’t already have Kali Linux you can download it here. If you are using an alternative Linux distribution
Features -> Create a hidden service -> Generate non-staged payload (python/meterpreter_reverse_http) -> Convert url using Tor2Web: a final extension .ws
Easiest way to install kali-linux on android using termux. you don’t need rooted phone. you can also use sudo (run
A way of hiding messages in messages, Use Zero-Width Characters to Hide Secret Messages in Text Zero-width characters are non-printing
Nmap is one of the most commonly used tools by ethical hackers. Its ease of use and clean installation along with
dnspeep lets you spy on the DNS queries your computer is making. Here’s some example output: $ sudo dnspeep query name
Use Android as Rubber Ducky against another Android device HID attack using Android Using Android as Rubber Ducky against Android. This is
hat are Hacking Tools? Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer
Installation in Linux : This Tool Must Run As ROOT !!! git clone https://github.com/Z4nzu/hackingtool.git chmod -R 755 hackingtool && cd
Unlock an Android phone by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for
It is a post-exploitation tool capable to maintain access to a compromised web server for privilege escalation purposes. The obfuscated
HULK is a Denial of Service (DoS) tool used to attack web servers by generating unique and obfuscated traffic volumes.
Hydra is a pre-installed tool in Kali Linux used to brute-force username and password to different services such as ftp,
DDoS stands for Distributed Denial of Service. This is a cyber-attack in which the attacker floods the victim’s servers with
We are going to show you how to make a persistent backdoor. Once you exploit some android device just do
USB Rubber Ducky — a device which resembles a regular USB flash drive. When connected to a computer, it claims
Sometimes, during security audits, we may encounter a situation where everything is being managed correctly. In other words security patches, policies,
Without admin privileges, installing additional software, or modifying the Windows 10 firewall, an attacker can alter a router and perform
The tactic of brute-forcing a login, i.e., trying many passwords very quickly until the correct one is discovered, can be
Having an efficient workflow is an integral part of any craft, but it’s especially important when it comes to probing
Nikto is a free software command-line vulnerability scanner that scans webservers for dangerous files/CGIs, outdated server software and other problems.
Learn Termux for hacking !! first, understand what is Termux and follow how to install applications using Termux and the complete Termux command. In this article, I
you want your terminal to be customized with awesome script every time you fire it up, huh?! Well, look no
This is a tutorial explaining how to hack android phones with Kali. I can’t see any tutorials explaining this Hack/Exploit,
After a hacker has configured Metasploit on a remote private server, created a resource script for automation, and created a
It’s easy to run Kali Linux from a live USB on nearly any available computer, but many publicly accessible laptops and
Kali Linux is known as being the de facto penetration-testing Linux distribution but can be a pain to use as
Deleted bank statements and private photos are still within an attacker’s grasp, so don’t think that emptying your recycling bin
Using a keylogger to intercept keys pressed on an infected computer can circumvent encryption used by email and secure chat
The microphone in a Windows computer is accessible to most applications running on the device at all times and completely
A powered-off Windows 10 laptop can be compromised in less than three minutes. With just a few keystrokes, it’s possible
In the penetration testing journey we must learn how to brute force attack. But the success of brute force attack
Install : pip install proxylist pip install mechanize Usage: BruteForce Gmail Attack python3 Brute_Force.py -g Account@gmail.com -l File_list python3 Brute_Force.py
uDork is a script written in Python that uses advanced Google search techniques to obtain sensitive information in files or directories, find
TorghostNG is a tool that make all your internet traffic anonymized through Tor network. Rewritten from TorGhost with Python 3. TorghostNG was