Browsing category

Hackers Repository

Pentest Box – Hacking on a Windows platform

Pentest Box is a portable penetration testing distribution for Windows environments,it provides all security tools as a software package, eliminating requirement of Virtual machines or dual-boot environments on Windows operating system. It provides all security tools as a software package, eliminating requirement of Virtual machines or dualboot environments on Windows Operating System. It is created […]

Get 2000 Backlinks for Free

If you own a website then you would know how important backlinks are. So we have a nice tool that gives you 2000 backlinks absolutely free. The tool at-most gives 3124 backlinks but some of them fail to work and you are expected to get around 2000 Google crawl-able backlinks from the tool. The tool is provided by IMTalk.org and is […]

Anonymous Opened Virtual School to Teach Hacking

The hacktivist group Anonymous have launched a virtual school in a dark web hidden service that allows you to share your experiences with the implementation and anonymizers cyberattacks. OnionIRC provides a forum to which access can be obtained through the Tor Messenger. The main objective of the hacktivist group Anonymous through this new service is […]

The Hacker that Hacked Facebook shows us how

“As a pentester, I love server-side vulnerabilities more than client-side ones. Why? Because it’s way much cooler to take over the server directly and gain system SHELL privileges. Of course, both vulnerabilities from the server-side and the client-side are indispensable in a perfect penetration test. Sometimes, in order to take over the server more elegantly, […]

The Vigilante Hacker that hacked Hacking Team

The hacker who hacked the Hacking Team explains how he did it and includes tips to avoid being busted The hacker responsible for bringing pwnage pain to the Hacking Team last July has published an in-depth “DIY guide” for how he pulled it off. It’s a detailed, really great read. The hacker is none other […]

How to Bypass URL shortener links

Sometimes we need to download very important data from the Internet but those links are attached with adfly and other ads network link. There are serious problem now a days as adf.ly has been blocked in India and a few other countries, by the Department of Telecom (DoT). So any user trying to access adf.ly […]

Extension Spoofer

A filename extension is very important in the Windows operating system and it appears at the end of the file name. Not only can you instantly tell what type of file format, whether it is an image or an executable application, Windows can also decide what program to launch it with based on what is […]

Hacking Wifi within 10 Minutes

Any non-technical person who knows how to operate the computer can hack/crack WiFi within or less than 10 minutes. PS. Screenshots are from BackTrack, but it’s same thing on Kali. NOTE: This tutorial is for Educational Purposes Only! What You’ll Need For this you will require all the basic things like a computer, spare time, […]

Addmefast BOT – 2016

AddMeFast is a network that will help you grow your social presence by exchanging likes for Facebook / Youtube / Twitter etc. The script is working with Firefox (the iMacros plugin/add-on) – Download here: https://addons.mozilla.org/en-US/firefox…r-firefox/ 1. Once you install the plugin, put the downloaded and extracted script (Download here) in “My Documents > iMacros > Macros” […]

MorphVOX PRO Cracked – Anonymous voice changer

If you want to make sure that your true identity remains a secret even if you want to talk over the Internet, you can rely on MorphVOX Pro, a voice-altering app. Once you install the utility, you will need to calibrate your microphone settings so as to make sure your voice is correctly and accurately […]

Building your own Pentest Lab

Following is the network we are going to setup in this article. Host machine = (192.168.1.103) which is connected to a wireless router = (192.168.1.1). Required Software: VirtualBox Kali Linux Windows Server 2003 pfSense Windows 7 VirtualBox Install VirtualBox in your host machine. VirtualBox can be downloaded from the link below. Download Link: https://www.virtualbox.org/wiki/Downloads Kali […]

120 Hacking Books to Download

Hackers education is very important. Most hackers attend college or reached that level by self-taught. There’s a saying: ” Hacking Is Not A Crime; It Is An Art “and artists aren’t made without going the extra mile. The very best are self taught and you can learn a lot by reading hacking books. If you […]

11 Tips to protect yourself against Ransomware

Ransomware can be very scary – the encrypted files can essentially be considered damaged beyond repair. But if you have properly prepared your system, it is really nothing more than a nuisance. Here are a few tips that will help you keep ransomware from wrecking your day 1. Back up your data The single biggest […]

Faceniff – Hacking Facebook from your Android Device

Faceniff is probably the most easiest way to gain access to someone’s  Facebook account and also works for twitter, YouTube, amazon, and  blogger accounts. It can be done completely from your android phone and  is compatible with most of the android devices.   Note: It won’t work, if the person is using https security option […]

How to send a spoofed SMS

SMS Spoofing occurs when a sender manipulates address information. Often it is done in order to impersonate a user that has roamed onto a foreign network and is submitting messages to the home network. Step 1: Fire Up BackTrack & Start Social Engineering Toolkit (SET) Let’s begin by firing up Backtrack 5 and then navigating […]

Anatomy of a Crypto-Ransomware attack

Ransomware is a type of malware that forces its victims to pay the ransom through certain online payment methods in order to grant access to their systems, or to get their data back.   Below are all the steps of how any ransomware works by delivering the malware, to the encryption algorithm, finding local IP’s […]

Hacking Facebook using Kali-Linux

Here we will discuss how to hack Facebook, as well as to develop understanding of how fake web pages are created, so that you can protect yourself from such attacks.   Requirements to hack Facebook Kali linux – Download here Setoolkit – Accessible within Kali   The Social-Engineer Toolkit (SET) was created and written by […]

Gophish – Open Source Phishing Toolkit

Gophish is an open-source Phishing tool designed for penetration testers. It is user-friendly and easy to setup and execute phishing engagements and security awareness training. Gophish is available on Windows, Linux and Mac. You can download this tool from its official site HERE How-To Install Download and extract the zip file – Gophish binaries are provided […]

Creating your own Run Commands

The Run command on Microsoft Windows Operating System allows you to directly open an application or document with just a single command instead of navigating to its location and double-clicking the executable icon. Follow these steps to create your own customized Run commands for accessing your favorite programs, files and folders. Let me take up […]

Windows 8.1 – Alienware OS released

Alienware OS released. The first version in this series, the Alpha, will run Windows 8.1. The operating system and ability to play PC games is what separates the Alpha from other operating systems.   Details about Alienware OS Main OS:Windows 8.1 Enterprise x64 Windows 8.1 AlienwareEdition 2015 ISO SIZE:4.1GB Updates : Full 2/13/2015 Net.Framework:3.5 Net […]