Setup Proxychains in Linux
What is Proxychains?
Proxychains is a tool that forces any TCP connection made by any given application to go through proxies like TOR or any...
Metasploit outside LAN
Downloading NGROK and setting up an account
Using it in msfvenomÂ
Starting a listener
Setting up NGROK
Setting up ngrok is fairly simple.
Go to their...
Emotet Banking Trojan is back again
Emotet, the infamous banking trojan has emerged again in the radar after a dip in its activity.
The latest version of Emotet can...
Crunch: Password Attacks
A crunch is a tool that is used to generate the wordlist, the wordlist is generated with all possible permutations and combinations, in which...
Google App Contains Joker Malware : Removed
Security scientists from Pradeo found Joker malware flooding the Play Store mimicking different applications. As uncovered through their post, they discovered six distinctive Android...
Best Hacking Documentaries That You Should Watch Right Now
In order to become an ethical hacker in the 21st century, you should know some coding laterally with good inspiration.
John The Ripper: Password Cracker
John the ripper is the password cracking tool, which is used to test password strength, brute-force encrypted (hashed) passwords, and crack passwords via dictionary...
Deep Web : How To Access it ?
Introduction:
There are many types of web ! but some of the main on which i will focus on my blog are:
1. Surface Web
2. Dark...
Pentagon Impedes 36 Million Malicious Emails Each Day
The Defense Information Systems Agency conducts an assessment of DoD web browsing practices to determine the utility of bandwidths.
The US navy spends around $160...
Shellphish : A Phishing Tool
Shellphish is a tool used for phishing attacks, this tool offers phishing templates of more than 18 famous websites.
NOTICE: This article is for educational...