Just want to know. Because I know I won't find it on google. Or do they have better hacking tools? If they do and you know what are those tools, then why don't we try those too?
- Hot
- Active
-
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 23 Replies
2 days ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 11 Replies
3 days ago -
Forum Thread: How to Track Who Is Sms Bombing Me . 4 Replies
2 wks ago -
Forum Thread: Removing Pay-as-You-Go Meter on Loan Phones. 1 Replies
1 mo ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 3 Replies
1 mo ago -
Forum Thread: moab5.Sh Error While Running Metasploit 17 Replies
2 mo ago -
Forum Thread: Execute Reverse PHP Shell with Metasploit 1 Replies
3 mo ago -
Forum Thread: Install Metasploit Framework in Termux No Root Needed M-Wiz Tool 1 Replies
4 mo ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 35 Replies
4 mo ago -
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
5 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
5 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
6 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
8 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
8 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
8 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
8 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
8 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
9 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
9 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
10 mo ago
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
Hack Like a Pro: How to Find Directories in Websites Using DirBuster
-
How To: Upgrade a Dumb Shell to a Fully Interactive Shell for More Flexibility
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
How To: Set Up a Wi-Fi Spy Camera with an ESP32-CAM
-
How To: Use Metasploit's WMAP Module to Scan Web Applications for Common Vulnerabilities
-
How To: Crack Any Master Combination Lock in 8 Tries or Less Using This Calculator
-
How To: Dox Anyone
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Enumerate SMB with Enum4linux & Smbclient
-
How To: Crack Password-Protected Microsoft Office Files, Including Word Docs & Excel Spreadsheets
-
Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds
-
How To: Use SQL Injection to Run OS Commands & Get a Shell
-
How To: The Top 80+ Websites Available in the Tor Network
-
How To: Top 10 Things to Do After Installing Kali Linux
-
Tutorial: Create Wordlists with Crunch
-
How To: Get Root with Metasploit's Local Exploit Suggester
-
How To: Use MDK3 for Advanced Wi-Fi Jamming
-
How To: Bypass File Upload Restrictions on Web Apps to Get a Shell
2 Responses
The NSA uses many tools, not necessarily on Kali. They use Metasploit, Core Impact, CANVAS and other tools. In addition, they develop their own tools.
Remember, to truly be a pro hacker, you need to be able to develop your own tools. The NSA writes their own tools. If you want that capability, you need to learn to script and develop your own exploits.
Wow! Thank you OTW. That was very direct yet simple explanation. I like it! I'll continue studying and practicing your tutorials.
Share Your Thoughts