I apologize for being an idiot, but I am facing of losing my kid to my ex. She has been plotting against me. I know for a fact she is using her FB to communicate about the case and getting people to testify against me. If i can get into her FB, I can get the proof and save my kid from a horrible mom. I know nothing about scripts or programming. Maybe one of you can help me out?
Sorry. It is Bruteforce again. If you saw my tutorial on getting Instagram accounts passwords, there were lots of complains that the script was no working well. Well, that was not my script, so I decided to make one myself instead.
Hi, I have Kali Linux 2017.3 and the Metasploit Framework version is metasploit v4.16.15-dev. I write:
How can I use proxy on my mobile Internet?
Hello, i want to know how i can hack into the Anonymebox v3 Image?
i have a ridiculous problem and i think i would need your assistance. I can't register on kali forums the captcha kicks me out every time i try. I'm pretty sure that i'm solved it correctly, when i click on the register button i even see the captcha processing and then a green checkmark, but i get the following message all the time i try:
EDB to PST Converter software user can efficiently recuperate damage EDB file as well as convert EDB to PST file in just few moments. It is compatible to recover from corrupt mailbox database and can export Exchange database into PST, PDF, MSG, EML and MBOX file formats.
Hello everyone! I thought I'd help a few people out by writing a written tutorial on how to install Kali Linux on your chromebook, as well as Metasploit-Framework, so let's begin! If you would like a video version instead, watch my YouTube video at the bottom of the page. Although this guide is a lot more clear.
Hello, Whats the status of these vulnerabilities ? 1-Spectre and Meltdown: they er new and huge! I hope tools will come soon, maybe in apps like metasploit, beef, bettercap.
Hey everyone... just my first post here. I'm looking for a wireless usb adapter to use with Kali 2.0, so I started some research on the most wanted adapters for hacking, that must include Monitor Mode and Packet Injection.
i have a android phone and im wondering if i could get remote access to it with just the ip of the device and being able to look to whatsapp etc . i would like to preform actions like in a metasploit session but just without an file that needs to be installed on the device
Introduction to Tor Tor is a browser just like google, Firefox and any other browser except it keeps you anonymous by hiding your IP address. Tor can be used to access the the dark web, where it is known for the use of illegal activities due to its anonymity.
I had to remove a Trojan from my laptop . After a few hours and scan FOR malware, I got rid of this problem and all seemed well.... then I realized that I was wrong. I understand "some" of my files on my hard drive can't be opened and the file is corrupted and give errors. I know these files are valid and I used them (at least until the virus) . I have damaged a lot of important me pdf files, I save the file to a pdf.For some files I have a backup, but for some I do not. So you need to find a...
Forum Thread: PostExploitation with Metasploit over NGROK tunneled session (Privilege Escalation on Windows7 7600 running Quick Heal)
I have port forwarded my local port 4444 with NGROK and use 0.tcp.ngrok.io in payload for lhost and 157xx as lport in payload and set lhost as 127.0.0.1 in handler and 4444 as lport in handler this is how I did it okay https://youtu.be/7ICmUdsNTuM
Hello, I am trying to hack a NTLM password hash with a plain-text length of 11. How to customize john the ripper to brute-force with this limit?
Hi everyone, this is my first post. I love hacking (after seeing Mr. Robot of course xD) but i'm new to this, actually i know nothing about and just started installing Kali 2.0 couple of days ago. I started messing up with some airmon-ng and aircrack commands. At first i type in "airmon-ng kill check" then it said it killed something i didn't remember, then after a couple of failed attempts on cracking WPA, i quit the Terminal and i started suffering web normally but then i realize that someh...
It use duckduckgo.com to gather external ip. need mechanize library.
So, I found this article yesterday... http://fossbytes.com/dont-try-to-hack-into-your-own-device-govt-will-destroy-it/
Hello guys! I wanted to know how to host a website on my computer.. I know the apache2 in kali which allows me to host a website on the local network... I don't want to host a website on the local network only... I want to host it on pc for all people can access it from everywhere! could u please help me ? I'm still a beginner in these stuff...
Hey guys. I'm trying to understand everything about Metasploit. But there's just some things that kind of confuse me and I'm hoping you guys can solve these problems. I understand how networks and IP's work but....
Forum Thread: How Do You Download Something on Someones Computer Once You Have Access from Meterpreter
Ive made everything i need to make and i have access to my other computer but what are some of the commands i can perform on the computer and how can i download something else after i have my payload in.
Forum Thread: Hey Guyz I Am New to Hacking and I Want to Know Something About Metasploit Payloads....
I started hacking with kali and i am curious about metasploit and tried to hack android with this payload "msfvenom -p android/meterpreter/reverse_tcp R> name.apk and when i deploy this malicious apk into phone it worked............but
Prompt, please, in what could be the problem? I received a letter with the file absolutely WinRaR archived, that is exactly installed on my computer, but opens the file in the form of some breaking brain characters and using a completely different program!!! What can be the matter? In all likelihood it is damaged... And how to open the file? Help, please!
Hi all. Awesome website. Do you know how ti install kali linux on ipad or iphone?
I have a Kali USB that I made with YUMI for multiboot reasons. Whenever I boot off it for Kali I get a super loud beep, and I mean super loud. Is there a way I can disable this?
Hello everyone , just finished writing an IDS with Standard User in python. The program is written in python 3 and uses the Scapy v. 3.0.0 module.
Hello. I have been having trouble getting the command "ifconfig" to work on my terminal. I do not have an external wireless card yet but plan on getting one. I know this may seem trivial. If anyone has any ideas please share. All ideas are welcome! Thanks!
Hello Null Byte,
Forum Thread: Kali Linux Wifi Won't Stay Connected. Although It Appears Connected There Is No Active Connection.
Ok, now made 2 USB sticks live boot Kali and set up my laptop to dual boot Kali and Windows. And with all 3 I have the same issue. The wifi connection will only stay active for the first 15 seconds or so after booting up or manually restarting the connection. Ifconfig iwconfig and network manager all show that I am connected. I can ping 184.108.40.206 and it is succesful. But once i do that or try to use the internet (firefox, apt-get update, anything) the connection no longer works. Even though net...
Forum Thread: Q. I Want to Hack My Isp Database and Get Myself Some Faster Internet So Is There Anyway to Get the Isp Database Ip
My isp is pretty old and i dont think it got it's database secured and honestly i dont think they care, so i need someone to help me in the process
I know quiet well linux and decide to start with kali linux few weeks ago. So i installed it on my usb key and boot in persistence mode with it. Everything worked as i was expecting, wifi connection... But i wanted to try aircrack-ng so i began with scaning networks but it doesn't seems to work :
I have been trying to make this program work for the past 3 days but I keep encountering the same problem over and over. I've followed the tutorial here So here is my command :
I was wondering if there was some way to hack the FM Radio of my rooted android device to bypass the restrictions of frequency range of 87.5 to 108 MHz to 'listen in' on other radio transmissions and convert it into a super cool Radioscanner !! :D
Android phones are very easy to break into if the victim can be Social Engineered into doing so. If you use Kali, you may have done this but probably in your own network. This guide shows you how to do so but over HTTP tunneling to a phone anywhere in the world.