Browsing category

Hackers Repository

Subgraph OS: Adversary resistant computing platform

Information security and privacy are consistently hot topics after Edward Snowden revelations of NSA’s global surveillance that brought the world’s attention towards data protection and encryption as never before. Moreover, just days after Windows 10’s successful launch last summer, we saw various default settings in the Microsoft’s newest OS that compromise users’ privacy, making a […]

How to Install Kali Linux on Android

Hacking with Kali Linux on your android device, hacking becomes much easier since you have all the tools (more than 300 pre-installed tools) Let’s Start, This tutorial helps you to run any GNU/Linux in your andoid device here am going to show the easy way to install Kali Linux in android phone and kali linux is […]

Turn old Smart Phone to Security Camera

If you have a lot of old smart phones at home, but don’t know what to do with them? Well here’s a solution: security camera!   Follow the steps below to turn your old smart phone to a security camera Step to follows: 1.Download IP Webcam from DOWNLOAD HERE 2.Launch the application, adjust the setting(depends […]

Zanti – Android App for Hackers

zANTI is a penetration testing toolkit developed by Zimperium Mobile Security for cyber security professionals. Basically, it allows you to simulate malicious attackson a network. With the help of zANTI, you will be able to perform various types of operations such as MITM attacks, MAC address spoofing, scanning, password auditing, vulnerability checks and much more. […]

Kon-Boot – Bypass windows passwords

Kon-Boot is an application which will silently bypass the authentication process of Windows based operating systems. Without overwriting your old password! In other words you can login to your Windows profile without knowing your password All that you will need is a USB and Kon-Boot which you can get Here. Step 1: Download the zip […]

Locky Ransomware – Latest global Cyber Security incident

If you receive a mail masquerading as a company’s invoice and containing a Microsoft Word file, think twice before clicking on it. Doing so could cripple your system and could lead to a catastrophic destruction. Hackers are believed to be carrying out social engineering hoaxes by adopting eye-catching subjects in the spam emails and compromised […]

How to Dox like a Pro

Firstly what is doxing? Doxing is a technique used to track, trace, and collect information on individuals or organizations online anonymously. So your question is how will we dox like a pro? To be honest it’s quite easy. I’ll show you 2 ways on how to dox like a pro. The first method will concentrate […]

How to obtain Blackberry engineering screen

Firstly, what is the advanced help screen? Basically, it’s a way to dive deeper into your OS and see what’s going on in there, and make a few tweaks. Some people have said that you can brick your BlackBerry by screwing around in here. I personally have played with many of the settings in here […]

How to trace an email address

Here is all the things that you need to trace an email address : Google Chrome (or a good and fast browser) Fast internet connection Access to a Google Account on which you received the mail. Now follow the steps below to track an email address. Open Google Chrome. Click here to visit the website, […]

CEH v9 – Certified Ethical Hacker v9 Course PDF + Tools DOWNLOAD

This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers Our security […]

How long will it take to crack your Password?

Kaspersky Lab has released a password strength checking tool, which tells you how long it will take someone to crack your password. “In earlier times, a six-symbol password was safe enough, now users need to invent combinations, which consist of at least eight symbols, but 15 is always better,” said Kaspersky Lab. Kaspersky Lab has […]

5 Tools to protect your Social Media accounts

You should have these five tools to protect your Facebook, Twitter, LinkedIn and other social media accounts Social media has taken the world by storm through dozens of websites, mobile apps, and other forms of technologies improving the way people communicate with each other. There are social media sites that have millions of members allowing […]

Dendroid – Android RAT

Dendroid is a HTTP RAT that is marketed as being transparent to the user and firmware interface, having a sophisticated PHP panel, and an application APK binder package. The seller markets Dendroid as offering many features that have never been seen before and comes with 24/7 support, all for a once off payment of $300 […]

Stealing Windows Passwords with your Android Device

A hacking tool discovered by analysts at F-Secure, which is capable of stealing information from a connected Windows machine. USB Cleaver seems to be designed to facilitate a targeted attack by gathering details that would be helpful in a later infiltration attempt. To use the application, user must install the application on his Android Smartphone […]

How to kick players Offline on PS4 / Xbox One

Using a few windows tools we are able to kick players offline and automatically win by default.   Whether you are a serious gamer or someone just pisses you off online. By attacking the designated IP address assigned to your opponent, you can kick/drop the player and he will be disconnected back to the main […]

Bypass Facebook Photo Tag Verification

Facebook notices when a security feature has been abused by placing a photo tag verification to reduce the amount of fake accounts. Whenever a Facebook user excessively abuse a security setting such as adding a lot of friends at a minimal time period or sending unwanted text messages. Facebook has implemented a photo tag verification […]

Cheat Sheets for most used programs today

Cheat sheets that list shortcuts for a number of essential programs that you probably use on a daily basis. This list will definitely make you more productive. Share them with everyone: Linux Commands Reference GIMP Shortcuts Mozilla Thunderbird Shortcuts Skype Shortcuts VLC Player Shortcuts XBMC Tips & Tricks Dropbox Tips Google Chrome Shortcuts Opera Shortcuts […]

Anti-Dox : Removing your information off the web

The Paranoid’s Bible (PB) is a repository of knowledge meant to help people remove their information (Dox) from the web and people search engines. The purpose of this chapter is to provide you with an up-to-date as possible listing of any and all opt-outs. This means you’ll be able to opt-out of not only known […]

Unlock Netflix’s hidden categories with these secret codes

Here’s a trick that’s been around for a while but may have passed you by: secret category codes added by Netflix engineers that can help you narrow down your on-demand video choices. From classic war movies to Brazilian dramas, here’s how to dig deeper into the Netflix library. Whenever you dive into a genre on […]

Reverse Engineering Tool – BinText

A small, very fast and powerful text extractor.It can extract text from any kind of file and includes the ability to find plain ASCII text, Unicode (double byte ANSI) text and Resource strings, providing useful information for each item. Basically, we need to extract the appropriate text that will lead us back to the hacker. […]

Facebook “Search is Back” – Ultimate search tool

For any social engineer / dox specialist, this is the ultimate search tool. This third-party tool combs through your own timeline or through the public one and puts it in an easy-to-understand interface. Head over to searchisback and find the people you are looking for. The broad categories are people, events, posts and shares, and […]