LockPhish — Phishing Attack on Lock Screen
LockPhish is the first phishing tool that can grab Windows credentials, Android PIN and iPhone Passcode using an https link.
Learn ethical hacking , cyber security, computer programming, networking, android tricks and windows tricks.
LockPhish is the first phishing tool that can grab Windows credentials, Android PIN and iPhone Passcode using an https link.
Ghost Framework is an Android post-exploitation framework that uses an Android Debug Bridge to remotely access and control Android device. Ghost Framework gives
Wi-Fi tools keep getting more and more accessible to beginners, and the LAZY script is a framework of serious penetration
In this article, we’ll be discussing about the exploitation of Android devices such as Tablets/Phones/Emulators etc using one of the
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and
Your IP (Internet Protocol) address is your unique ID on the internet. It’s synonymous with your home address. Anyone in the
The Social-Engineer Toolkit (SET) is an open-source penetration testing framework designed for social engineering. SET has a number of custom attack vectors
Facebook really wants your phone number, nagging you for one as soon as you join. This isn’t all bad since it
Phone numbers often contain clues to the owner’s identity and can bring up a lot of data during an OSINT
You may not have thought of dorks as powerful, but with the right dorks, you can hack devices just by
Google is an incredibly useful database of indexed websites, but querying Google doesn’t search for what you type literally. The
Many of my aspiring hackers have written to me asking the same thing. “What skills do I need to be
To track someone with Grabify, you first pick a link that would be natural to send. Then, you disguise the
There are more than 2 billion Android devices active each month, any of which can be hacked with the use of a
You know, Mr Robot is my favourite TV show this year, and not just for realistic hacking. Rami Malek, the
When researching a person using open source intelligence, the goal is to find clues that tie information about a target
Kali Linux, by default, probably doesn’t have everything you need to get you through day-to-day penetration testing with ease. With
As most of you know, I am a strong advocate for using Linux as a hacking platform. In fact, I would
Many of you here are new to hacking. If so, I strongly recommend that each of you set up a “laboratory”
TWRP is the premiere custom recovery for Android because of how many devices it supports and how simple it is
Many new hackers come from a Windows background, but seldom if ever, use its built-in command-line tools. As a hacker,
Have you ever wondered where the physical location of an IP address is? Maybe you want to know if that proxy server
It seems like every day now that we see a new headline on a cybersecurity breach. These headlines usually
Each day, we read about another security breach somewhere in our digital world. It has become so commonplace that
As we know, Windows 10 is out with its excellent features and today we are going to introduce an easy
Today we are going to share an interesting trick to find out server IP address of Any website with the help of
In Windows PC, there are many commands and Hidden features that we don’t know. In this post, I tell you
Hello, guys today I am going to tell you about how to hack victim password if he is connected on
Recently i had learn how to hack Wifi (WPA2-PSK) from Kali Linux,thought to share with you guys,this is just manipulation
hello guys, have u ever want something from your friend pc, that he is not giving you like games, movies
hello guys, now I am going to guide you on how to access the victim system remotely using the IP
In this post you are about to learn How to ROOT just any Android phone or Tablet Just by flashing
You can experiment these trick with your neighbours or friends. It’s not necessarily that this trick will work with every
DDos is defined as “Distributed Denial of Service Attack“. This tutorial explains what is DDosing and how to hack a
Some of these codes are very dangerous! USE THIS AT YOUR OWN RISK. Download Spyboy App Block Google. Code: @echo
IMP. Note>> I am not responsible for any damage or error reporting in Your pc do it as ur own
Here, I am going to show you how to hide, encrypt and secure your data everywhere you go. We will
We sometime wish that if someone insert his/her USB Into your pc then its data automatically copy in to your
If hacking is performed to identify the potential threats to a computer or network then it will be an ethical
In this method, we will remove write protection from Pendrive using commands in Cmd. This will fully clean the write
Here I am discussing some of the Apps that are meant for the Security tester, Ethical hacker and for those
Time to increase your internet speed by Changing Default DNS to Google DNS. DNS is Domain Name system that first
When any device gets connected to wifi network then the wifi password gets saved in that device for a while
Android Serial number of every mobile device is its identity to recognize that network on the cellular network and to recognize