General Discussion
Forum Thread: How to Build Ransomware
# LeafyWare Leafyware-ransomware
Forum Thread: What Is the Best JavaScript Frameworks to Learn?
Despite the fact that modern developers can choose from a wide range of JavaScript-framework, five of them stand out: Meteor.js, Angular.js, React.js, Ember.js, Backbone.js.
Forum Thread: Rescue-ssh.target Is a Disabled or a Static Unit
So last night I watch your video on how to install kali linux or re4son ons the Raspberry Pi 3 b+ and I got everything right until you putted in the command dpkg reconfigure openssh.service the I get the error rescue-ssh.target is a disabled or a static unit I looked on other forms for the command that wil help but none did, so please help.
Forum Thread: How Can I Access the Files in My Phone's Internal Storage Using Kali?
I have download Kali Linux on Android. I was trying "How to hack android remotely" tutorial. But, after creating the app file, I was not able to locate it. It was not in my phone's internal memory. It was in the root folder. I tried to copy it into my phone's internal memory, but I was not able to find the directory for my phone's internal memory. How can I access, add and remove files in my phone's internal storage using Kali?
Forum Thread: High School Graduation Project
Hey guys, So I'm looking for a project to do as my graduation project.
Forum Thread: How to Protect Your cPanel Server from Backdoor Access, Plus a Warning for the Disabled Shell Access Setting in WHM
This article will show you how a hacker could gain command line access to their cPanel account even after you've suspended it. Additionally, it will show you how they could get shell access even if you have disabled it in WebHost Manager (WHM).
Forum Thread: Decrypt Password from Epub That Using Zip Libiaries
I have an issue for my epub book with zip (filename.zip) that cannot be opened because of password protected. But it can automatically open in local ebook publisher's software (This epub.zip is obtained from this software) I wanna know ... Can I obtained password from local software (or) Can I decrypt that protected epub.
Forum Thread: Kali Linux on Headless RPI4
Last week I flashed Offensive Security's latest release of Kali Linux (2020.3) for Raspberry PI 4 and have spent probably close to 10 hours now trying to get it to connect to my 2.4G wireless network to no avail. I can get it to connect after login (when I login using my screen and keyboard), and can get it to join over ethernet (without logging in), but for the life of me, I cannot get it to connect over 2.4G wifi on bootup using the typical method of placing the empty SSH file and wpa_suppl...
Forum Thread: Hello
hey when i tried to install phoneinfoga i run the first two commands thats shown and when i run the theird one it says error no such directory requirements.text please tell me how i can fix that
Forum Thread: How to ping troubleshooting in ubuntu launcher?
I Have a Ubuntu Based Operating System Launcher Iso Work on Firefox,When I Install Launcher in Two Different Pc They Ping Each Other in Local network.but When I Launched/Start the Launcher a Ping Is Lost or Unreachable..why is happen?
Forum Thread: Bad Usb Keyboard Layout
i saw the tutorial for the badusb using Arduino and worked fine. But i cannot change the layout of the keyboard in windows using Keyboard.print("setxkbmap us\n");
Forum Thread: Ruby vs. Python
What language should i choose? I would like to learn Ruby but i dont know if it has the same capabalities as Python?
Forum Thread: I Have a Doubt Regarding "Crunch" in Kali Linux
I am actually new to ethical hacking. So, Crunch generates a wordlist to crack .cap files to obtain the Wi-Fi Password. Let as assume that I have alloted 25GB of storage to Kali Linux and I am using crunch to generate a wordlist of all possible 8 characters, which includes uppercase and lowercase characters, numbers and special characters. So Crunch generates some data like this
Forum Thread: Does Arp Spoofing Needs Monitor Mode?
i donot have a external wireless adapter that supports monitor mode and i wanted to practise MITM attacks so i wanted to know does MITM attack needs monitor mode to be enabled? i am using kali on vmware i can perform attack on another virtual os on my pc with nat but can i attack other device on my network by keeping the network in bridged mode?
Forum Thread: AMD RX 580 Driver for Kali LINUX
Hi guys, Im running Kali Linux as my machine, and I have an RX580 Graphics Card that I would like to make use of!
Forum Thread: Kali Linux Wont Boot on RPI 4 8g
i keep getting the same boot error saying resize root file
Forum Thread: Mode Monitor Doesn't Work
Hi everyone, im new in hacking and cracking. i have a prbolem when i use aircrack or fluxion. they have same problem. the problem is mode monitor can't scan anything. I mean, there are many wifi but mode monitor can't scan it. I use this to check
Forum Thread: Bettercap-Ui Problem in Kali Linux
Hello, i have been following some bettercap tutorials from a while and i have learned a lot. The problem im facing is that i have installed bettercap-ui from terminal and it successfully installed but, when i open the ui help menu by typing help ui it gives me an error saying that bettercap-ui has been disabled in kali, try installing it or updating it as shown in figure. I have tirelessly searched google and other forums but none was related this issue. Please guide me for the solution.
Forum Thread: help
when i tried to open cap file to see captured handshake it shows failed to open what should i do please someone help me?
Wifi Hacking: How to Attach USB Wireless Adapter with Virtual Box
Why we need wireless Adapter Wireless adapter is very important for wifi hacking activities. Because for wifi hacking, you need to put your network interface in monitor mode. The built in wireless adapter of laptop does not work well for monitor mode. Besides many of us use Kali Linux as virtual machine. In virtual machine, network is shown as cable connected network and it cannot go to monitor mode. So for both of the above causes, we need external wirelss adapter to run in monitor mode.
Forum Thread: How to Retreive a Password from an Hash
During CTFs, it's common to encounter some hashes that you may want to crack. You can do it offline by cracking them, you can google them or use a web service that stores massive data about cracked or generated hashes. The best way (if you can't afford cracking them on your own) is to relay on those web sites. But you can't check them one by one until you find a match. So why don't use a tool that does this on its own?
Forum Thread: Top 4 Hacking Software for Windows
today i am talking about some hacking software that can used for hacking. john the ripper it the best password cracker in windows.you can run john the ripper in command line tool
Forum Thread: How can i Solve if Pc Installed with Kali Limux Isn't Showing Any Application on Desktop and Anywhere??
Hi sir, Actually i have installed kali linux on my pc, this was my first time to install kali linux. I don't what happened but from when i have installed kali linux, it's not showing not even a single application on desktop or anywhere. There is only one application that i can open is SETTINGS, nothing else, pls tell me how to solve this issue, please please please
Forum Thread: Back to Home Screen Using Shortcut Key in Windows
some times your pc is freeze or hang so you have to restart your pc but there is a shortcut key that will take you to home screen windows logo key + D
Forum Thread: Metasploit is stuck after sessions is open. Meterpreter doesn't show up
I'm experimenting with Metasploit and using it on my own machine. I'm running Kali Linux on VirtualBox and trying to open a meterpeter session to my host Win 10 OS.
Forum Thread: Rtl8812bu on Kali Linux
I have installed virtual box from Oracle. I am using Kali Linux from Offensive security, 2020b. I have Tp-Link archer t4u ( rtl8812BU) as wifi adapter. When I type "ifconfig" terminal does not show "wlan0" but when I type "ifconfig" it shows "wlan0". When using "airmon-ng" to enable monitor mode it fails. It shows error changing to mode using ip. The status of the wlan0 is down and I am unable to change it to up. Please help. I need to turn on monitor mode and package injection
Penetration Testing: Simple Ways to Perform Banner Grabbing
Before performing banner grabbing, let us discuss some basic ideas of "Banner Grabbing", This is the common technique to gather information about the targeted host.
Forum Thread: How to Get Code Blocks in a How-To
Sorry if this seems very noobish, i am writing a forum and I need to add some bash. I don't know how to get the shell commands to look like the terminal from other how-tos,
Forum Thread: Limitations of Banner Grabbing During Penetration Testing
Banner Grabbing is a technique to collect information about the system and/or software information like, software version, network port and service information, operating systems version, web server technologies (i.e. apache, nginx) etc. Administrators use this banner grabbing technique to make software inventories. On the contrary, intruders use the same banner grabbing technique to plot and execute successful attacks to have unauthorized access in to the system.
Forum Thread: How Do I Switch a Netcat Shell to a Metasploit Meterpreter?
So I have a reverse shell on a windows box through powershell and was wondering if there was a way to switch it over to a meterpreter session in metasploit.
Forum Thread: Hack Windows and Linux Using Ashwatthama Botnet
Ashwatthama Botnet Work Over Http Use Github and Serveo and Ngrok No Portforwarding Needed ### Requirement
Forum Thread: During Cloning Target AP with FLUXION , the Real Wifi Is Working Perfectly??
Wifi only can hack with fluxion if and only if the victim is sign in our clonned ap. If their real wifi is working perfectly, how will they signup ? I Can't Deauthenticate the target at the Same Time . Is That Happening Because of Having Only one NIC? Can I Solve This Prob by Using an Additional Usb Wifi Adapter. Or is there any other solutions.??
Forum Thread: Crack Password Using AI with PassHemorrhage
What is It? Basically its a model based on PassGAN along with Common User Password Profiler for users to create their own password lists with the help of AI.