Obviously, this has nothing to do with the art of hacking. Yet every would be hacker at some time will get the urge to pimp their BASH PROMPT.
Forum Thread: How to Brute Force Dictionary Attack Gmail Accounts with THC Hydra Master on Windows 7 and Above
Today, I will teach you how to dictionary attack Gmail accounts with THC Hydra Master. THC Hydra is a password cracking tool created by Marc "van Hauser" Heuse. Let's start!!
Many people here are hackers. And have been for a long time. Some may be cyber-security experts. I don't know. But why do you hack? Do increase cyber security awareness? For the sheer fun of it? Or to make people look like this when they discovered their account was just hacked.
Recently i was using my mail service for a subscription. And they said me to enter the otp (one time password) sent to my mail on their Site.
Whenever i try to set a multi handler this error occurs. It Used to work for me but not working anymore
Hello everyone today i will show you how to install Ubuntu server the last version without any problems .
Firewall Rule Base Review or Optimization What is Firewall Rule Base Review?
Hello everyone! I thought I'd help a few people out by writing a written tutorial on how to install Kali Linux on your chromebook, as well as Metasploit-Framework, so let's begin! If you would like a video version instead, watch my YouTube video at the bottom of the page. Although this guide is a lot more clear.
Hello! So. Today i woke up and opened my VM. Then i got a notification saying something like "Could not connect to network"
I just watched a youtube video of a Guy that hacked a company and i wonder How did he do that just by that the victim went in on a website?
Simple question, which one of these two USB adapters is better?
Hey guys, I am new to this whole stuff. Been reading some guides and tutorial and I think I'm getting the hang of it. Thing is, I am trying to hack into a neighbor's pc (I have his permission). All of the recoinnesance and exploiting tools I see already asume you have your victim's IP address, which I do not have. The most I've been able to get is his MAC address by sniffing the traffic with airodump-ng. Is there any way to get the victim's IP with the MAC address or by network sniffing? (Wir...
I am trying to connect my android device to metasploit via reverse tcp, but it never shows up on the console. I have a Nexus 5 running Nethunter and Android 5.1.1
i have a android phone and im wondering if i could get remote access to it with just the ip of the device and being able to look to whatsapp etc . i would like to preform actions like in a metasploit session but just without an file that needs to be installed on the device
When working with the database in MS Access error occurred, a message appears stating that it is necessary to compact and repair the database. But I can't even open a database, because it leaves the error message in the program. What to do?????? Is there a way bring back source file????
Ok, newbie here but looking at the process, it seems kind of dumb You guys turn a word list into a hash list and then compare it one by one to the original hash, right?
After gaining Access to phone is it possible to rest gmail/email password and gain access to the persons full email ? if so, then how to do it ?
Welcome to the first official article of Hacking and You; where we will be discussing the non-technical aspects of hacking, hacking culture, and the role it will play in our lives.
How can I find out someone's name and information about the from just their cell phone number? Ive tried white pages and other services like that but most of them won't show the persons name or any of that stuff. So what can I do to get that info?
i got Panda pau06 and i removed its 2dbi and antenna and attached 9dbi antenna to it and i don't know wether its working or not, can any one tell me how to check that, any software tool suggestion or anything else, please help
How Can I Find the Phone Number Behind an Email Adress(Yahoo)
Hi, I am a Kali Linux user, and I used metasploit to get access of the webcam.
How It Works About a week ago I wrote a quick article about madwin. I decided it was a bit too fluffy, and since I've recreated the GitHub repo anyway, I may as well write up a new one. If you've already read my previous article, you still may want to stick around. Without further ado, let's get into madwin!
But when i click on graphical install or any other its starts normally but after 30 sec or 1 min my screen crashes showing lines colour ful lines nothing works but when start windows 7 noting happens like that what should i do here some images
While surfing the internet, I found that there is a vulnerablity in whatsapp called "fakesapp", I don't know, how can I use it for my benefits, can somebody explain me?
Forum Thread: Kali Linux(Vbox) Doesn't Show Any Networks Using External Wifi Adapter(Ralink Tl-wn7200)
Hello guys, i've got a Kali linux installed on my virtual box including extension pack in it
Hello friends this is my first null-byte, today i am going to explain HOW TO RESET ADMIN PASSWORDS FOR WINDOWS (7,8)
Forum Thread: How to Install Metasploit on Android with 1 Single Command - Termux Pentesting Tutorial
Hi what's up guys today I'll be showing you how to install Metasploit on any Android smartphone with 1 single command with the help of an app called Termux.
Hi Im really new at creating an Evil Twin AP
I have a error based mysql injection I'm having problems exploiting and was wondering if someone could help. I only have a basic knowledge of sql scripting. Here is the request and it's response.
Okay, I know this sounds a little stupid, but how do you change the "root@kali" to "root@yourchoice" username?
Sup, my fellow white hat hackers, today I am going to show you how to mass-mail attack people. (THIS TUTORIAL IS FOR BEGINNERS, IT IT REALLY SIMPLE, DON'T EXPECT TOO MUCH)
Hi all, I started to learn using hydra recently and tried to brute force some web base login form which i already have access to,but after running the required command of hydra which is as follows..
I'm trying to create a windows executable meterpreter payload using msfvenom to execute on my own computer running Windows 7 64-bit. I've tried using the following commands to produce the executable: