Nikto – Scan Any Website for Vulnerabilities
Nikto is a free software command-line vulnerability scanner that scans webservers for dangerous files/CGIs, outdated server software and other problems.
Learn ethical hacking , networking, social engineering, cyber security, pen-testing, linux, android, windows tricks.
Nikto is a free software command-line vulnerability scanner that scans webservers for dangerous files/CGIs, outdated server software and other problems.
Learn Termux for hacking !! first, understand what is Termux and follow how to install applications using Termux and the complete Termux command. In this article, I
This is a tutorial explaining how to hack android phones with Kali. I can’t see any tutorials explaining this Hack/Exploit,
Deleted bank statements and private photos are still within an attacker’s grasp, so don’t think that emptying your recycling bin
Using a keylogger to intercept keys pressed on an infected computer can circumvent encryption used by email and secure chat
A powered-off Windows 10 laptop can be compromised in less than three minutes. With just a few keystrokes, it’s possible
In the penetration testing journey we must learn how to brute force attack. But the success of brute force attack
Install : pip install proxylist pip install mechanize Usage: BruteForce Gmail Attack python3 Brute_Force.py -g Account@gmail.com -l File_list python3 Brute_Force.py
uDork is a script written in Python that uses advanced Google search techniques to obtain sensitive information in files or directories, find
TorghostNG is a tool that make all your internet traffic anonymized through Tor network. Rewritten from TorGhost with Python 3. TorghostNG was
Facebook Brute Forcer in shellscript using TOR Legal disclaimer:Usage of Facebash for attacking targets without prior mutual consent is illegal. It’s the
SocialBox is a Bruteforce Attack Framework [Facebook, Gmail, Instagram,Twitter], Coded By Belahsan Ouerghi. Download Spyboy App Installation sudo apt-get install git sudo git
Instagram-Py is a simple python script to perform basic brute force attack against Instagram , this script can bypass login limiting on wrong passwords , so basically
Modern Phishing Tool With Advanced Functionality SCREENSHOT (Android-Userland) CREDIT:- Anonud4y ( I don’t remember if i have done Anything )
Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles Using Image Recognition And Reverse Image Search. This only
Fluxion is a security auditing and social-engineering research tool. It is a remake of linset tool by vk496 which is not upgraded
A normal Internet user send files on internet through mails, messaging applications, Google Drive, DropBox, WeTransfer etc. But as security
Nowadays people are smart enough. They don’t get trapped under phishing. Because the link does not look like the original
An IP address lookup will determine the geolocation of any IP address. The results of the IP address lookup will show
Computer viruses are simply malicious programs or malware that “infect” other system files with the intention of modifying or damaging
Google is one of the most popular search engine offers many different features in different languages. The term “Google Dork”
When we install Kali Linux on Desktop or Laptop we didn’t connect it with Wi-Fi. Sometimes internal WiFi adapter not
We are covering dirsearch tutorial in this post. it’s a simple command-line python based website directory/path scanner which can brute-force any targeted
Kali Linux WiFi Adapter The all new Kali Linux 2020 was rolling out and we can simply use it as
If you have been using Google Search for a while, then you might know that it’s a home of secrets.
There are plenty of Virtual phone number apps available for Android that provides users a secondary phone number. The secondary
Deepmagic Information Gathering Tool (DMitry) is a command-line application coded in C. DMitry has the ability to gather as much as
Well, if we look around, we will find that those days are gone when the web browsers were only used
Well, there are plenty of torrent websites available out there from where you can download your favorite torrent content. Here
Shodan is world’s first search engine to search devices connected with internet, that means it can search webcams, databases, industrial
It is very important to know what technology behind a web app before going against it. Like it would be
Sometime we need to run our localhost website or server over internet. To do this we need to forward our
ZPhisher is an advanced phishing tool-kit it is an upgraded version of Shellphish. It has the main source code from Shellphish but ZPhisher
Aircrack is a software suite for networks, Aircrack can perform network detection, packet-sniffing and cracking WEP/WPA2. Aircrack consists of many
HaxRat is a cloud-based remote android management suite in simple word it is an Android RAT, powered by NodeJS. It
We all try to secure our all online accounts and social media accounts and we turn on the Two-Factor
Information is power. Information gathering is the most crucial part of penetration testing. Tracking targets IP address, browser, Operating Systems,
Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, and new
Today we are going to learn about recon-ng. Recon-ng is a very good tool for web application analysis. Recon-ng is a
How to send anonymous text, emails and media files? There are many options available to sending things anonymously, but we don’t
Nowadays Social media is getting very popular. There are lots of social media sites around us, like Twitter, Instagram, Facebook, YouTube, Reddit, Pinterest, Tumblr, Medium etc. Userrecon is a
Using Social Mapper we can do mass scan. Not only that the main function is we can find someone with
In our this detailed tutorial we are going to learn how attacker’s attacks on our devices and steal our personal