- Hot
- Active
-
Forum Thread: How to Hack Wireless Password Through MAC Address and IP Address 25 Replies
1 day ago -
Forum Thread: Complete Guide to Creating and Hosting a Phishing Page for Beginners 50 Replies
6 days ago -
Forum Thread: HELP I Created an Apk for Hacking My Phone Using Kali Linux in Virtual Box How Can I Install That Apk on My Phone 18 Replies
2 wks ago -
Forum Thread: Mitm attack problem 2 Replies
3 wks ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 32 Replies
4 wks ago -
Metasploit Error: Handler Failed to Bind 40 Replies
1 mo ago -
Forum Thread: How to Know if You Are a Script Kiddie? 9 Replies
1 mo ago -
Forum Thread: How to Identify and Crack Hashes 8 Replies
1 mo ago -
Forum Thread: How to Hack School Website 8 Replies
1 mo ago -
Forum Thread: Whenever I Try "Airmon-Ng Start wlan0" There's an Error? 16 Replies
1 mo ago -
Forum Thread: How to Fix 'Failed to Detect and Mount CD-ROM' Problem When Installing Kali Linux 14 Replies
1 mo ago -
Forum Thread: Awesome Keylogging Script - BeeLogger 30 Replies
2 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 27 Replies
2 mo ago -
Forum Thread: Create and Use Android/Meterpreter/reverse_tcp APK with Msfvenom? 121 Replies
2 mo ago -
How to: Minecraft DoS'Ing with Python. 1 Replies
3 mo ago -
Forum Thread: Tools for Beginner Hacker 3 Replies
3 mo ago -
Forum Thread: How to Embed an Android Payload in an Image? 9 Replies
4 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 46 Replies
4 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 11 Replies
4 mo ago -
Forum Thread: Fix Initramfs Problem 5 Replies
4 mo ago
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Find Passwords in Exposed Log Files with Google Dorks
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
How To: Create a Persistent Back Door in Android Using Kali Linux:
-
How To: Phish for Social Media & Other Account Passwords with BlackEye
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
BT Recon: How to Snoop on Bluetooth Devices Using Kali Linux
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng
-
How To: Scan Websites for Interesting Directories & Files with Gobuster
-
How To: Hack WiFi Using a WPS Pixie Dust Attack
-
Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How To: Dox Anyone
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
How To: Spy on Traffic from a Smartphone with Wireshark
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Hack Android Using Kali (Remotely)
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
2 Responses
Put your actual question inside your post, rather than create a bulky headline.
I also suggest providing screenshots of your ATTEMPT at performing this rather than coming here and asking how to even start.
Before asking a question of any kind, spend 5 minutes searching Null Byte because chances are someone else has asked it before.
You can create a payload with msfvenon and encode it, than you can use mingw32 to compile a C exploit in a ".exe" file.
Share Your Thoughts