Reverse Shell Cheat Sheet
If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterward you’ll probably want an interactive shell.
If it’s not possible...
John The Ripper: Password Cracker
John the ripper is the password cracking tool, which is used to test password strength, brute-force encrypted (hashed) passwords, and crack passwords via dictionary...
Best Hacking Documentaries That You Should Watch Right Now
In order to become an ethical hacker in the 21st century, you should know some coding laterally with good inspiration.
Shellphish : A Phishing Tool
Shellphish is a tool used for phishing attacks, this tool offers phishing templates of more than 18 famous websites.
NOTICE: This article is for educational...
Crunch: Password Attacks
A crunch is a tool that is used to generate the wordlist, the wordlist is generated with all possible permutations and combinations, in which...
Hackers Leak Personal Data from Hundreds of German Politicians On Twitter
Germany has been hit with the biggest hack in its history.
A group of unknown hackers has leaked highly...
Deep Web : How To Access it ?
Introduction:
There are many types of web ! but some of the main on which i will focus on my blog are:
1. Surface Web
2. Dark...
Setup Proxychains in Linux
What is Proxychains?
Proxychains is a tool that forces any TCP connection made by any given application to go through proxies like TOR or any...
Database Hacking : Sql Injection
SQL injection is a very common technique for hacking web applications, SQL injection can easily destroy the database of the website.
SQL injection is the...
Smart Bulbs: Next big target for cyberattacks?
Researchers at UTSA have recently discovered that invisible wave spectrum in smart bulbs which come equipped with infrared abilities can be taken advantage of...