John The Ripper: Password Cracker
John the ripper is the password cracking tool, which is used to test password strength, brute-force encrypted (hashed) passwords, and crack passwords via dictionary...
Crunch: Password Attacks
A crunch is a tool that is used to generate the wordlist, the wordlist is generated with all possible permutations and combinations, in which...
Hackers Leak Personal Data from Hundreds of German Politicians On Twitter
Germany has been hit with the biggest hack in its history.
A group of unknown hackers has leaked highly...
Latest Bluetooth hacking techniques expose new attack vectors for hackers
BlueBorne is a vulnerability discovered in several Bluetooth implementations.
Btlejacking relies on the jamming vulnerability tracked as CVE-2018-7252 and affects BLE devices with...
Metasploit : Mobile Hacking
Hack Smart Phone Using Kali(Remotely)
Hello Hackers,
This is a tutorial explaining how to hack smart phones with kali.
STEP 1: OPEN KALI/PARROT:
# Open up your terminal...
Setup Proxychains in Linux
What is Proxychains?
Proxychains is a tool that forces any TCP connection made by any given application to go through proxies like TOR or any...
Database Hacking : Sql Injection
SQL injection is a very common technique for hacking web applications, SQL injection can easily destroy the database of the website.
SQL injection is the...
Deep Web : How To Access it ?
Introduction:
There are many types of web ! but some of the main on which i will focus on my blog are:
1. Surface Web
2. Dark...
The First Ever Youtube Video Has Been Ruined: Here’s Why
The first-ever video that was uploaded to youtube has been ruined because of some hack which has taken place.
The video’s description has been edited...
Best Hacking Documentaries That You Should Watch Right Now
In order to become an ethical hacker in the 21st century, you should know some coding laterally with good inspiration.