Hackers Leak Personal Data from Hundreds of German Politicians On Twitter
Germany has been hit with the biggest hack in its history.
A group of unknown hackers has leaked highly...
Setup Proxychains in Linux
What is Proxychains?
Proxychains is a tool that forces any TCP connection made by any given application to go through proxies like TOR or any...
Database Hacking : Sql Injection
SQL injection is a very common technique for hacking web applications, SQL injection can easily destroy the database of the website.
SQL injection is the...
Reverse Shell Cheat Sheet
If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterward you’ll probably want an interactive shell.
If it’s not possible...
John The Ripper: Password Cracker
John the ripper is the password cracking tool, which is used to test password strength, brute-force encrypted (hashed) passwords, and crack passwords via dictionary...
Metasploit : Mobile Hacking
Hack Smart Phone Using Kali(Remotely)
Hello Hackers,
This is a tutorial explaining how to hack smart phones with kali.
STEP 1: OPEN KALI/PARROT:
# Open up your terminal...
Metasploit outside LAN
Downloading NGROK and setting up an account
Using it in msfvenom
Starting a listener
Setting up NGROK
Setting up ngrok is fairly simple.
Go to their...
Deep Web : How To Access it ?
Introduction:
There are many types of web ! but some of the main on which i will focus on my blog are:
1. Surface Web
2. Dark...
The First Ever Youtube Video Has Been Ruined: Here’s Why
The first-ever video that was uploaded to youtube has been ruined because of some hack which has taken place.
The video’s description has been edited...
This Skype vulnerability allows you to bypass Android’s phone lock
A security researcher found a vulnerability in Skype’s Android app which allows users to access several app functions without entering the passcode...