
You might have harvested many things upto now but what we are going to harvest today is something bad :)Requirements:A Linux box (I'm using Kali Linux)theharvester program (already available in Kali L…
meNGAKui, meNGIKuti, meNGUKir Kebenaran
You might have harvested many things upto now but what we are going to harvest today is something bad :)Requirements:A Linux box (I'm using Kali Linux)theharvester program (already available in Kali L…
Hoy me he topado con algo bastante gracioso que puede liarte unos minutos:python>>> import re>>> a='owjf oasijf aw0oifj osfij 4.4.4.4 oasidjfowefij 192.168.1.1'ok, pues ahora copy-pasteais cada una de…
uTorrent, one of the most popular BitTorrent clients, is now available for Android smartphones and tablets. Its use on mobile devices is very similar to its use in the PC. All you need is to search fo…
Kali Linux has been the most advanced penetration testing machine introduced yet. It has the most valuable tools used for every sort of hacking. To take advantage of Kali Linux hacking tools, you have…
I spent the last couple days recoding the Pillager, getting rid of bugs, optimizing code, making it more extendable and more solid overall. So this post is to release the new code. However, with that…
RapidScan's Features:One-step installation.Executes a multitude of security scanning tools, does other custom coded checks and prints the results spontaneously.Come of the tools include nmap, dnsrecon…
RFCrack uses the following hardware with RFCat libraries:YardStick One: https://goo.gl/wd88srI decided to cleanup my RF testing harness and release it as a tool named RFCrackMostly because it has been…
Related articles Master Growth Hacking Hacking Definicion Linux Hacking Distro Master Growth Hacking El Libro Del Hacker Hacking With Python Curso Hacking Etico Gratis Hacking Wifi Windows Bod…
"BeEF is the browser exploitation framework. A professional tool to demonstrate the real-time impact of XSS browser vulnerabilities. Development has focused on creating a modular structure making new …
This Video is absolutely for Educational Purposes only, please don't do any illegal activity. If you do then I'm not responsible for your illegal activity. The purpose of this video is to show you How…
In general decompilers are not friendly with c++ let's analyse a simple program to get familiar with it.Let's implement a simple code that loads a file into a vector and then save the vector with foll…
CLOUDKiLL3R bypasses Cloudflare protection service via TOR Browser !CLOUDKiLL3R Requirements :TOR Browser to scan as many sites as you want :)Python CompilerCLOUDKiLL3R Installation ?Make sure that TO…
The Zed Attack Proxy team is pleased to announce two recently released initiatives:ZAP In TenThe team have just launched a new series of videos called 'ZAP in Ten' in conjunction with AllDayDevOps.ZAP…
What is Bug Bounty ?A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs. Bug bou…
What is reconnaissance in ethical hacking?This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip …