John The Ripper: Password Cracker
John the ripper is the password cracking tool, which is used to test password strength, brute-force encrypted (hashed) passwords, and crack passwords via dictionary...
Metasploit : Mobile Hacking
Hack Smart Phone Using Kali(Remotely)
Hello Hackers,
This is a tutorial explaining how to hack smart phones with kali.
STEP 1: OPEN KALI/PARROT:
# Open up your terminal...
Shellphish : A Phishing Tool
Shellphish is a tool used for phishing attacks, this tool offers phishing templates of more than 18 famous websites.
NOTICE: This article is for educational...
Child Pornography Website Taken Down from Dark Web
One of the most nefarious child pornography website which went by the name of “Welcome to Video” has been taken down and seized. Reportedly,...
Latest Bluetooth hacking techniques expose new attack vectors for hackers
BlueBorne is a vulnerability discovered in several Bluetooth implementations.
Btlejacking relies on the jamming vulnerability tracked as CVE-2018-7252 and affects BLE devices with...
Ransomware Attack At Equinix Data Center
A security occurrence at Equinix has come about in ransomware getting into a portion of the server farm colocation goliath's interior frameworks.
Equinix recognized the...
Best Hacking Documentaries That You Should Watch Right Now
In order to become an ethical hacker in the 21st century, you should know some coding laterally with good inspiration.
Crunch: Password Attacks
A crunch is a tool that is used to generate the wordlist, the wordlist is generated with all possible permutations and combinations, in which...
Hackers Leak Personal Data from Hundreds of German Politicians On Twitter
Germany has been hit with the biggest hack in its history.
A group of unknown hackers has leaked highly...
Xiaomi MIUI 12 update has been finally rolled out for its various smartphones from...
MIUI 12 is the next iteration of the brand's operating system (OS) based on Android. It was announced back in April for several Xiaomi...