R4VEN – track user’s smartphone/pc ip And gps location.
The tool hosts a fake website which uses an iframe to display a legit website and, if the target allows
Learn ethical hacking , networking, social engineering, cyber security, pen-testing, linux, android, windows tricks.
The tool hosts a fake website which uses an iframe to display a legit website and, if the target allows
Easiest way to install kali-linux on android using termux. you don’t need rooted phone. you can also use sudo (run
The information security environment has changed vastly over the years. Now, in spite of having security policies, compliance, and infrastructure security
According to the dictionary meaning, a hacker is any person who usually has extraordinary computer skills and uses his knowledge
In the penetration testing journey we must learn how to brute force attack. But the success of brute force attack
Install : pip install proxylist pip install mechanize Usage: BruteForce Gmail Attack python3 Brute_Force.py -g Account@gmail.com -l File_list python3 Brute_Force.py
uDork is a script written in Python that uses advanced Google search techniques to obtain sensitive information in files or directories, find
TorghostNG is a tool that make all your internet traffic anonymized through Tor network. Rewritten from TorGhost with Python 3. TorghostNG was
Facebook Brute Forcer in shellscript using TOR Legal disclaimer:Usage of Facebash for attacking targets without prior mutual consent is illegal. It’s the
SocialBox is a Bruteforce Attack Framework [Facebook, Gmail, Instagram,Twitter], Coded By Belahsan Ouerghi. Download Spyboy App Installation sudo apt-get install git sudo git
Instagram-Py is a simple python script to perform basic brute force attack against Instagram , this script can bypass login limiting on wrong passwords , so basically
Modern Phishing Tool With Advanced Functionality SCREENSHOT (Android-Userland) CREDIT:- Anonud4y ( I don’t remember if i have done Anything )
Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles Using Image Recognition And Reverse Image Search. This only
Fluxion is a security auditing and social-engineering research tool. It is a remake of linset tool by vk496 which is not upgraded
A normal Internet user send files on internet through mails, messaging applications, Google Drive, DropBox, WeTransfer etc. But as security
Nowadays people are smart enough. They don’t get trapped under phishing. Because the link does not look like the original
Total No. of Questions = 20 1. Enumeration is useful to system hacking because it provides which of the following?
Total No. of Questions = 20 1. Which of the following is used for banner grabbing? A) Telnet B) FTP
Total No. of Questions = 20 1. Which of the following best describes footprinting? A) Enumeration of services B) Discovery
An IP address lookup will determine the geolocation of any IP address. The results of the IP address lookup will show
Computer viruses are simply malicious programs or malware that “infect” other system files with the intention of modifying or damaging
As you prepare for your pentester interview, you may be considering which questions the employer is going to ask you.
Total No. of Questions = 20 1. Symmetric cryptography is also known as __________. A) Shared key cryptography B) Public
Total No. of Questions = 20 1. At which layer of the OSI model does a proxy operate? A) Physical
Total No. of Questions = 20 1. If you have been contracted to perform an attack against a target system,
# Total No. of Questions = 35 Q1. What is the focus of a security audit or vulnerability assessment? A)
Google is one of the most popular search engine offers many different features in different languages. The term “Google Dork”
When we install Kali Linux on Desktop or Laptop we didn’t connect it with Wi-Fi. Sometimes internal WiFi adapter not
We are covering dirsearch tutorial in this post. it’s a simple command-line python based website directory/path scanner which can brute-force any targeted
Kali Linux WiFi Adapter The all new Kali Linux 2020 was rolling out and we can simply use it as
Want to turn your Android device into a fully functional computer? Well, there are lots of launcher apps available on
Over the past few years, Microsoft’s Windows 10 has improved a lot. The desktop operating system has gotten better in
Some users use Command Prompt daily. Some use to flush the DNS every time they get an internet error; and
If you have been using Google Search for a while, then you might know that it’s a home of secrets.
There are plenty of Virtual phone number apps available for Android that provides users a secondary phone number. The secondary
Deepmagic Information Gathering Tool (DMitry) is a command-line application coded in C. DMitry has the ability to gather as much as
Well, if we look around, we will find that those days are gone when the web browsers were only used
As of now, there are plenty of desktop operating systems available on the market. Some of them are free and
Well, there are plenty of torrent websites available out there from where you can download your favorite torrent content. Here
There are plenty of sites available out that there on the internet that offers free ebooks. In this article, we
Willing to become a hacker or security expert? There are a whole lot of things to consider. In this article,
Although it’s true that Microsoft’s Windows operating system right now powers more than three-fourths of the PC’s in the world,
Shodan is world’s first search engine to search devices connected with internet, that means it can search webcams, databases, industrial
It is very important to know what technology behind a web app before going against it. Like it would be
Steghide is a command line stenography tool. The word stenography is combination of Greek words “Steganos” that means covered or
Sometime we need to run our localhost website or server over internet. To do this we need to forward our
ZPhisher is an advanced phishing tool-kit it is an upgraded version of Shellphish. It has the main source code from Shellphish but ZPhisher