hackers tools

  1. xanix

    Hacking How to use Sweeper to clean your Browser History

    As you can read, sweeper just clear your browsers like cookies, history, cache etc. 1. Installation Code: sudo apt install sweeper 2. Start Sweeper Code: sweeper / sudo sweeper 3. Overview If you opened sweeper successfully then you can see a tab of "Privacy Settings", here you can choose...
  2. Serafim

    Hacking How to use Stecer to clean up your Linux

    If you use Linux you might miss ccleaner and it's utilities to clean windows. Well we have different tools on Linux which are free to use. 1. Install Stacer *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** Finally your system has been...
  3. Jaysu

    Hacking How to Enumerate MYSQL Database using Metasploit – Kali Linux Tutoria

    Cyber reconnaissance is the most significant phase to stimulate an attack. Without any prior knowledge of a victim and the weaknesses that can help to exploit the target, the attack could not be successfully generated. Talking about target, Cyber world is not entirely an internet but a lot more...
  4. Dorblue

    Hacking Hacking Apple | Icloud on iPhone & iPad

    The method is suitable for absolutely any iOS device (absolutely any version). What is the essence of the blocking bypass method? The method consists in spoofing the Apple iCloud DNS addresses. STEP 1 We choose absolutely any, there is no difference. STEP 2 If Wi-Fi is already connected...
  5. al capone

    Hacking Setting up iPhone to carding work

    1. Who does not know how to use socks on an iPhone - there are 2 methods. The first is to go to Wi-Fi, poke the letter "i". Scroll to the bottom, see the proxy settings, enter, profit. The second is the ShadowRocket attachment. I think you can figure it out on your own. 2. How to replace GEO...
  6. Otto

    Hacking 6 Methods of hacking two-factor authentication

    Two-factor authentication (2FA) has long been known for the security it can bring to organizations and their customers. The combination of what you know, what you have, and what you are is the heart and soul of 2FA and helps explain ITS relative reliability. Even so, attackers are known to have...
  7. Lucky

    Tips What is phishing fraud and 10 tips to avoid it

    Cyber criminals use different methods of attacks to get your personal data, and phishing fraud is one of them. Phishing scams are usually fraudulent email messages that come from legitimate businesses (for example, your university, your Internet service provider, your bank, or your online...
  8. al capone

    Hacking MorphVOX - a program for changing the sound of your voice when communicating

    In addition to simply changing the voice in IP telephony applications (Skype, AIM, Yahoo, MSN, GoogleTalk, TeamSpeak, etc.), this program can use audio effects that will add variety to Your background environment. For example, use the effect of a noisy shopping center or traffic jam - your...
  9. Serafim

    News The apartment of the hacker who broke into security cameras in Tesla, was searched

    The hacker is wanted for " hacking computer databases with subsequent theft and dissemination of information." Police in Lucerne (Switzerland) searched the apartment of hacker Tillie Kottmann, who took responsibility for the massive hacking of video surveillance cameras with face recognition...
  10. Dep

    Hacking Best CCleaner Alternatives That Are Safe to Use in 2021

    CCleaner has been praised as one of the most effective tools you can use to clean up your junk. This junk can be anything from temporary files and broken shortcuts. You can also use the app to fix other PC problems that you might have, including issues originating from your computer’s registry...
  11. Jaysu

    Cryptocurrency Ethereum on track to settle $1.6 trillion this quarter

    Ethereum's quarterly settlement value is on course to increase by 1,280% year-over-year. Ethereum usage is surging this year, with the value of transactions settled on the network skyrocketing during 2021. According to research from Messari, Ethereum has settled $926 trillion worth of...
  12. Soldier

    Anonymity About exfiltering data through DNS

    Two-thirds of information leaks are not due to malice. Otherwise, these are intentional actions of cybercriminals, employees of the organization or its contractors. If we have a blind execution of a command on a server where all outgoing connections are blocked, except for DNS, a bash script...
  13. Otto

    Hacking Brutedum - brute force attacks ssh, ftp, telnet etc.

    #1 BruteDum is a SSH, FTP, Telnet, PostgreSQL, RDP, VNC brute forcing tool with Hydra, Medusa and Ncrack. BruteDum can work with aany Linux distros if they have Python 3. Features of BruteDum SSH, FTP, Telnet...
  14. Gap

    Hacking Hacking Tools | you should know in 2021

    Let’s start with a comparison between one thing and another, typically for the purpose of explanation or clarification. A bricklayer with many years of experience goes to a land to perform a job. He knows the tools at his disposal. When he needs to dig the ground to make foundation, for example...
  15. Tasken

    Hacking Ditto - A Tool For IDN Homograph Attacks And Detection

    Ditto - A Tool For IDN Homograph Attacks And Detection Ditto is a small tool that accepts a domain name as input and generates all its variants for an homograph attack as output, checking which ones are available and which are already registered. PoC domains https://tᴡitter.com/...
  16. Jeremys

    Hacking Phpvuln - Audit Tool To Find Common Vulnerabilities In PHP Source Code

    Phpvuln - Audit Tool To Find Common Vulnerabilities In PHP Source Code phpvuln is an open source OWASP penetration testing tool written in Python 3, that can speed up the the process of finding common PHP vulnerabilities in PHP code, i.e. command injection, local/remote file inclusion and...
  17. Otto

    Hacking WSuspicious - A Tool To Abuse Insecure WSUS Connections For Privilege Escalations

    WSuspicious Summary This is a proof of concept program to escalate privileges on a Windows host by abusing WSUS. Details in this blog post: WSUS Attacks Part 2: CVE-2020-1013 a Windows 10 Local Privilege Escalation 1-Day | GoSecure It was inspired from the WSuspect proxy project...
  18. xanix

    Hacking WPCracker - WordPress User Enumeration And Login Brute Force Tool

    WPCracker WordPress user enumeration and login Brute Force tool for Windows and Linux With the Brute Force tool, you can control how aggressive an attack you want to perform, and this affects the attack time required. The tool makes it possible to adjust the number of threads as well as how...
  19. Serafim

    News In Russia, a cyber fraudster who operated on the territory of Belarus was convicted

    The attacker was engaged in extortion, blocking the operation of computer systems using malware. The Uraisk City Court of the Khanty-Mansiysk Autonomous Okrug-Ugra sentenced a Russian citizen who engaged in cyber fraud on the territory of the Republic of Belarus to two years in prison...
  20. al capone

    Hacking UhOh365 - A Script That Can See If An Email Address Is Valid In Office365

    UhOh365 A script that can see if an email address is valid in Office365. This does not perform any login attempts, is unthrottled, and is incredibly useful for social engineering assessments to find which emails exist and which don't. Microsoft does not consider "email enumeration" a...
Top Bottom