hacking tools

  1. Gap

    Hacking Slackware Linux installing latest 2021

    installing Slackware Linux Slackware Linux is one of the oldest Linux distributions remaining. Over the years, it has stayed true to its roots and form. Here's what the author, Patrick Volkerding has to say about it. The Slackware Philosophy Since its first release in April of 1993...
  2. Gap

    Anonymity SSH and SFTP

    The transport layer protocol provides algorithm negotiation and key exchange. The key exchange includes server authentication and results in a cryptographically secured connection that provides integrity, confidentiality and optional compression. Forward security is provided through a...
  3. Dorblue

    Tips Comprehensive Lists Of Checkers

    Hello guys, These are comprehensive list of IP, Browser and devices checkers Pixelscan Cover Your Tracks (top checker) AmIUnique (also top) Free IP Address Lookup & Proxy Detection Test | IP Address Details | Proxy IP Check (will check your IP quality) Downloads | AIDA64 (a program which...
  4. Serafim

    Hacking How to use Stecer to clean up your Linux

    If you use Linux you might miss ccleaner and it's utilities to clean windows. Well we have different tools on Linux which are free to use. 1. Install Stacer *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** Finally your system has been...
  5. Jaysu

    Hacking How to Enumerate MYSQL Database using Metasploit – Kali Linux Tutoria

    Cyber reconnaissance is the most significant phase to stimulate an attack. Without any prior knowledge of a victim and the weaknesses that can help to exploit the target, the attack could not be successfully generated. Talking about target, Cyber world is not entirely an internet but a lot more...
  6. al capone

    Hacking Setting up iPhone to carding work

    1. Who does not know how to use socks on an iPhone - there are 2 methods. The first is to go to Wi-Fi, poke the letter "i". Scroll to the bottom, see the proxy settings, enter, profit. The second is the ShadowRocket attachment. I think you can figure it out on your own. 2. How to replace GEO...
  7. Lucky

    Tips Leaked Method | GET Free SMS-Phone Verification

    Leaked Method | GET Free SMS-Phone Verification *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** Now you should have a number. To see SMS messages, go to the # (Phone Numbers) option -> Active numbers Click on the number and proceed to...
  8. Gap

    Tips To create self-registered accounts, you usually need the following tools

    To create self-registered accounts, you usually need the following tools - Fullz (Full info ) I will not go into what it is and how, there are many articles above where you can learn the terminology *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum...
  9. Otto

    Hacking 6 Methods of hacking two-factor authentication

    Two-factor authentication (2FA) has long been known for the security it can bring to organizations and their customers. The combination of what you know, what you have, and what you are is the heart and soul of 2FA and helps explain ITS relative reliability. Even so, attackers are known to have...
  10. Dorblue

    Anonymity What’s the Difference Between a VPN and a Proxy?

    A proxy connects you to a remote computer and a VPN connects you to a remote computer so they must be, more or less, the same thing, right? Not exactly. Let’s look at when might you want to use each, and why proxies are a poor substitute for VPNs. Selecting the Right Tool Is Critical...
  11. Lucky

    Tips What is phishing fraud and 10 tips to avoid it

    Cyber criminals use different methods of attacks to get your personal data, and phishing fraud is one of them. Phishing scams are usually fraudulent email messages that come from legitimate businesses (for example, your university, your Internet service provider, your bank, or your online...
  12. Core

    Anonymity Dedicated Server (RDP) FAQ. What are "RDP" and what they are eaten with.

    The article was created for general development and updating \ obtaining new knowledge in this area. I am not teaching you to do anything, I am only teaching you a theory. It will be useful for those new to this business or those who would like to learn something new. RDP - obviously came from...
  13. Otto

    News Hackers can redirect victims ' SMS messages to their phone number for as little as $16

    Some companies forward SMS messages to another number without requesting permission for this operation or even notifying the user. A specialist of the Motherboard publication has discovered a dangerous problem, the operation of which allows attackers to secretly redirect SMS messages of victims...
  14. al capone

    Hacking MorphVOX - a program for changing the sound of your voice when communicating

    In addition to simply changing the voice in IP telephony applications (Skype, AIM, Yahoo, MSN, GoogleTalk, TeamSpeak, etc.), this program can use audio effects that will add variety to Your background environment. For example, use the effect of a noisy shopping center or traffic jam - your...
  15. Dep

    Hacking Best CCleaner Alternatives That Are Safe to Use in 2021

    CCleaner has been praised as one of the most effective tools you can use to clean up your junk. This junk can be anything from temporary files and broken shortcuts. You can also use the app to fix other PC problems that you might have, including issues originating from your computer’s registry...
  16. Jaysu

    Cryptocurrency Ethereum on track to settle $1.6 trillion this quarter

    Ethereum's quarterly settlement value is on course to increase by 1,280% year-over-year. Ethereum usage is surging this year, with the value of transactions settled on the network skyrocketing during 2021. According to research from Messari, Ethereum has settled $926 trillion worth of...
  17. Serafim

    News Firefox 86 now offers full protection against cookies

    Total Cookie Protection restricts cookies to the site where they were created, so they cannot be used for tracking purposes. Mozilla has implemented the Full Cookie Protection feature in the new version of its Firefox 86 browser. The new protection feature is built into the Enhanced Tracking...
  18. sanok

    Anonymity Chrome with TOR

    Kronymous is a dedicated console for establishing a secure connection. *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** After all these steps, all your traffic will go through the TOR network, all tabs will have a different IP. To disable...
  19. Gap

    Hacking Cqtools - the new ultimate windows hacking toolkit

    CQURE Team has prepared tools used during penetration testing and packed those in a toolkit named CQTools. This toolkit allows to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom...
  20. Otto

    Hacking Brutedum - brute force attacks ssh, ftp, telnet etc.

    #1 BruteDum is a SSH, FTP, Telnet, PostgreSQL, RDP, VNC brute forcing tool with Hydra, Medusa and Ncrack. BruteDum can work with aany Linux distros if they have Python 3. Features of BruteDum SSH, FTP, Telnet...
Top Bottom