Browsing category

Hackers Repository

Overview of Social Engineering

“In the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.” A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional “con” in that it is often one of many steps in a more complex fraud scheme. […]

Reset Windows Password with Kali

Sometimes we forget our password, or even we want to reset the password of the windows OS of our friends, officemate or anybody laptops in legal way. Today i am going to teach you how to reset a password using our Favorite Penetration Testing Operating System the Kali Linux. Requirements: 1.Kali Operating System (click here) […]

Google Dorks – Google Hacking

Google search engine find answer to our question which is helpful in our daily lives, search about our school assignments, reports, presentation and more.  Before i start the tutorial on how we are going to use Google Dorks in Penetration Testing and Ethical Hacking i am going to define this, in some website or article give […]

Windows 10 – Most Important Features you need to know

With Windows 10, Microsoft is making a strong step towards its goal of One Microsoft by looking forward to connect all the Windows devices more effortlessly. Now, Windows 10 is released and we are going to tell you the best features of Windows 10. Windows 10 was the major feature of the event. Let’s take […]

Building your own Web Crawler

Web crawler is a program that browses the Internet (World Wide Web) in a predetermined, configurable and automated manner and performs given action on crawled content. Search engines like Google and Yahoo use spidering as a means of providing up-to-date data. Webhose.io, a company which provides direct access to live data from hundreds of thousands […]

Hacking WiFi – Selecting the best strategy

Not every hack will work under every circumstance, so choosing the right strategy is more likely to lead to success and less wasted hours and frustration. Here, I will lay out the strategies based upon the simplest and most effective first, through the most complex and difficult last. In general, this same continuum will apply […]

Ollydbg – Cracking software like a pro

If you’ve ever wondered how software pirates can take software and crack it time and time again, even with security in place, this small series is for you. Let’s go over how cracking could work in practice by looking at an example program (a program that serves no purpose other than for me to hack). […]

RunAsDate – Cracking Trial Software

It infuses the predefined date and time to the objective programming in this way preventing it from expiry. Demo variant programming basically accompanies one month trial period and will lapse after that. When we introduce these product in our framework; they make a passage of subtle elements like Installation Date, Time and so on in […]

Flooding a Facebook User

This guide will show you how to flood a persons facebook wall, comments, and messages. What is flooding? Basically spamming the same thing over and over really quickly, i.e. 1000 wall posts in 1 minute.   What this requires: A facebook account and a target Auto Clicker (download here: http://www.shockingsoft.com/AutoClicker.html) A computer with internet Login […]

NodeZero – Lurking in the shadows of Pentesting

Us penetration testers have of course all heard of BackTrack it’s the most popular penetration testing distro out there but Node Zero is a great alternative. Node Zero was formally known as Ubuntu Pentest Edition and was the first Ubuntu/Gnome based pentesting distro out. . NodeZero uses Ubuntu repositories so your system will be always […]

Hacknet , a real Hacking game.

Developed by Team Fractal Alligator, an Australian one-man studio, Hacknet is “an immersive, terminal-based hacking simulator for PC.”   Here’s the official promotional trivial: Dive down a rabbit hoIe as you follow the instructions of a recently deceased hacker, whose death may not have been the accident the media reports. Using old school command prompts […]

WEAKERTH4N – Another Hacking OS

Most of the hackers would have heard about Backtrack. Weakerthan is another Linux based pentesting distro which is really good.. I think Weakerthan is second best OS for hackers after Backtrack.   Weakth4n Linux is designed primarily for penetration testing. It’s Built from Debian Squeeze. Tools:  BRuWRT-FORSSE v2.0  Easy-SSHd  Web-Hacking-Portal v2.0  Perlwd  Netgh0st v3.0  YouTube-Thief!  Netgh0st v2.2  DomainScan  ADtrace  Admin-Tool […]

Removing a PDF password

Now a days, we all save our data in a Word file or a PDF file. Some have basic information and some have secret information. To secure those files, you might need to put a password on your PDF files because setting a password on your PDF file is very easy and anyone can do […]

A Guide to become an Ethical Hacker

A person who hacks into a computer network in order to test or evaluate its security, rather than with malicious or criminal intent. So if you want to be an ethical hacker the truth is there is no easy method to become a skilled hacker…… it’s easy to be a script kiddie and load up Armitage […]

Download Torrents with IDM

There may be many reasons to download torrent files using IDM. It may be that you get good speed using IDM, no issue to leech and seed the torrent, best to download small size files. But the question arises How to download torrent files using IDM? IDM can help a user to increase the download […]

Review of Parrot OS

Parrot Security OS is a security oriented operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonymity and cryptography. Based on Debian and developed by Frozenbox network. Parrot is designed for everyone, from the Pro pentester to the newbie, because it provides the most professional tools combined in a easy to use, […]

Hacker Series – Enough to motivate you?

With the amount of hackers expanding in the modern world, so does TV shows start to react. Time to get your ‘mode’ back on….   As a human species, we all need that ‘motivation’ to enhance our interest, whether that being your hobby, work or even friendships. For us, IT security enthusiasts, we like to […]

Backbox – Turning heads in the pentesting scene

A relative newcomer to the forensic and penetration testing live CD scene, Italian project BackBox is already turning heads as it hits version 2.01. Gareth Halfacree explains why… The live CD includes English, German, Spanish, French and Italian modes It’s fair to say that there’s no shortage of penetration testing and forensic analysis toolkits – […]

Turning your Android into a hacking device

Now days, smartphones and tablets are the most popular gadgets. The reason behind this is that people utilize tablets for most of their work. And there is no need to explain that Android is ruling global smartphone and tablet markets. Android is the most popular mobile OS with more than 60% market share. As we […]

Review of Kali Linux – The Successor of backtrack

Kali Linux is a penetration testing and security auditing Linux distribution. After its release in March 2013, Kali Linux has quickly become the new favorite among PenTesters worldwide as their choice for the PenTesting OS. Replacing its predecessor Backtrack, Kali incorporated several new features and looks quite promising.It is available for i386 and amd64 architectures […]

Linux…. Where did it come from?

Linux was originally developed as a free operating system for personal computers based on the Intel x86 architecture, but has since been ported to more computer hardware platforms than any other operating system. Thanks to its dominance on smartphones, Android, which is built on top of the Linux kernel, has the largest installed base of […]