Hacking is the process of gaining unauthorized access into a computer system, or group of computer systems. This is done through cracking of passwords and codes which gives access to the systems. Cracking is the term which specifies the method by which the password or code is obtained. The...
Step 1 : Make Sure You Have Everything
To prepare our evil twin access point attack, we'll need to be using Kali Linux or another supported distro. Quite a few distributions are supported, and you can check out the Airgeddon GitHub page for more about which Airgeddon will work with.
You can use...
Embarking on the journey of cyber security can be daunting, but fear not! I've curated a step-by-step roadmap, from fundamental principles to advanced techniques, ensuring a seamless learning experience.
️ Prerequisites:
To dive into this world, all you need is a clear mindset, a functioning...
1: Have access to target email(s).
2: Call the carrier support. Tell them to email you a new 6 digit pin. Not difficult at all as most reps are based in Asia and couldn't give a toss.
3: Once you’ve successfully changed the pin, you now need a second SIM pre paid or post paid.
DO NOT port to a...
MAC address spoofing is a technique for temporarily changing your Media Access Control (MAC) address on a network device. A MAC Address is a unique and hardcoded address programmed into network devices which cannot be changed permanently. The MAC address is in the 2nd OSI layer and should be...
PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which allows for job control. The stub size is around 14kb and can be compiled on any Unix like system.
Why not use a traditional Backconnect/Bind Shell?
PostShell...
SMS-Bomber - software designed for mass sending (spam) SMS messages to a specified mobile phone number.
Installation for windows:
Download Python3.8
https://www.python.org/downloads/release/python-38
After that we need to download Impulse from GitHub'a
Now open cmd and go to the folder with the...
1: Dnsdumpster :- dns recon & research , find & lookup dns records
2: Verify email address :- Verify email address online using free email verification tool.
3: ZOOMEY :- find iot device and bugs in android WordPress PHPMyAdmin and much more
4: Search CVE List :- Common Vulnerabilities and...
Hack server with brute force it is to risky so i dnt suggest you to do this . we will use tool today is named hydra it is very popular tool we need kali linux to run it . and we will do it in ((ftp file transfer protocol)) the files saved on server we will hack that you know that website is...