R4VEN – track user’s smartphone/pc ip And gps location.
The tool hosts a fake website which uses an iframe to display a legit website and, if the target allows
Learn ethical hacking , networking, social engineering, cyber security, pen-testing, linux, android, windows tricks.
The tool hosts a fake website which uses an iframe to display a legit website and, if the target allows
Easiest way to install kali-linux on android using termux. you don’t need rooted phone. you can also use sudo (run
The information security environment has changed vastly over the years. Now, in spite of having security policies, compliance, and infrastructure security
Kali Linux WiFi Adapter The all new Kali Linux 2020 was rolling out and we can simply use it as
Want to turn your Android device into a fully functional computer? Well, there are lots of launcher apps available on
Over the past few years, Microsoft’s Windows 10 has improved a lot. The desktop operating system has gotten better in
Some users use Command Prompt daily. Some use to flush the DNS every time they get an internet error; and
If you have been using Google Search for a while, then you might know that it’s a home of secrets.
There are plenty of Virtual phone number apps available for Android that provides users a secondary phone number. The secondary
Deepmagic Information Gathering Tool (DMitry) is a command-line application coded in C. DMitry has the ability to gather as much as
Well, if we look around, we will find that those days are gone when the web browsers were only used
As of now, there are plenty of desktop operating systems available on the market. Some of them are free and
Well, there are plenty of torrent websites available out there from where you can download your favorite torrent content. Here
There are plenty of sites available out that there on the internet that offers free ebooks. In this article, we
Willing to become a hacker or security expert? There are a whole lot of things to consider. In this article,
Although it’s true that Microsoft’s Windows operating system right now powers more than three-fourths of the PC’s in the world,
Shodan is world’s first search engine to search devices connected with internet, that means it can search webcams, databases, industrial
It is very important to know what technology behind a web app before going against it. Like it would be
Steghide is a command line stenography tool. The word stenography is combination of Greek words “Steganos” that means covered or
Sometime we need to run our localhost website or server over internet. To do this we need to forward our
ZPhisher is an advanced phishing tool-kit it is an upgraded version of Shellphish. It has the main source code from Shellphish but ZPhisher
Aircrack is a software suite for networks, Aircrack can perform network detection, packet-sniffing and cracking WEP/WPA2. Aircrack consists of many
HaxRat is a cloud-based remote android management suite in simple word it is an Android RAT, powered by NodeJS. It
We all try to secure our all online accounts and social media accounts and we turn on the Two-Factor
Information is power. Information gathering is the most crucial part of penetration testing. Tracking targets IP address, browser, Operating Systems,
Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, and new
Today we are going to learn about recon-ng. Recon-ng is a very good tool for web application analysis. Recon-ng is a
How to send anonymous text, emails and media files? There are many options available to sending things anonymously, but we don’t
Nowadays Social media is getting very popular. There are lots of social media sites around us, like Twitter, Instagram, Facebook, YouTube, Reddit, Pinterest, Tumblr, Medium etc. Userrecon is a
Using Social Mapper we can do mass scan. Not only that the main function is we can find someone with
In our this detailed tutorial we are going to learn how attacker’s attacks on our devices and steal our personal
CamPhish is a camera phishing toolkit inspired from saycheese, it is an upgraded version of saycheese. We can get camera clicks from
Surfing the internet has become a passion for everyone but most of the search engines keep the log of our
We have learns how Tor network works and how to use it in our Tor tutorial. As we know dark websites
In today’s detailed tutorial we will learn how we can host a website from our Kali Linux machine over WiFi
The LaZagne project (A password recovery tool) is an open-source application used to retrieve lots of passwords stored on a
Windows would be one of our common targets since it is the most used operating system in the corporate environment.
Hello guys, today we’re going to show you how hackers can create a persistent backdoor in android using Kali Linux
Spoiler Alert: I suggest you to try to hack your way into the site, before actually reading anything below. If
WordPress is one of the most popular open-source CMS nowadays having more than 100 million users. WordPress security is a
As a penetration tester, there will be times that the client requirements will be to perform social engineering attacks against their
With the help of ready-made vulnerable applications, you actually get a good enhancement of your skills because it provides you
In a recent survey, only 15% of business owners saw security as a challenge when more than half had reported
Social media accounts are a favourite target for hackers, and the most effective tactics for attacking accounts on websites like
With the help of Seeker which is an open-source python script, you can easily find the geolocation of any device
SocialFish is an open-source tool through which you can easily create a phishing page of most popular websites like Facebook/Twitter/Github