hackers

  1. x32x01

    Multiple Ways to Crack WordPress login

    In this article, you will be learning how to compromise a WordPress website’s credentials using different brute forcing techniques. Table of Content Pre-requisites WPscan Metasploit Burp Suite How to avoid a Brute Force Attack? Pre-requisites: Target: WordPress Attacker: Kali Linux (WPscan)...
  2. x32x01

    Hardware Hacking Cheatsheet

  3. x32x01

    It Wasn’t Me - Secure Your Account

    It Wasn’t Me - SecureYourAccount
  4. x32x01

    Mr.Robot All Seasons 1,2,3,4 Full | Watch Online [FREE]

    Mr.Robot All Seasons 1,2,3 Full | Watch Online Mr.Robot is a series that is broadcast on American television. The main character of the film is Elliot, a fear-impaired youngster who communicates directly with others and just wants to find out about those around him by getting into their...
  5. x32x01

    Types of Hackers

  6. x32x01

    A Beginner’s Guide to Buffer Overflow

    In this guide, we are going to learn about what is a buffer overflow and how it occurs? Buffer Overflow occurs by overwriting memory fragments of a process or program. Overwriting values of certain pointers and registers of the process causes segmentation faults which cause several errors...
  7. x32x01

    Programming Languages To Learn To Be An Expert Hacker!

    A programmer ought to know many programming dialects and abilities. Diverse applications and site which you utilize are customized in a particular code. Before turning into a hacker you need to have an incredible programming skills. You need to comprehend that you have to learn programming...
  8. x32x01

    Cybercriminals exchange tips on underground forums about avoiding arrests

    The technique behind cyberattack has been uncovered by stalking on underground forums, and also what hackers say to do if or whenever they are apprehended. Released on Monday, the Digital Shadows cybersecurity team investigated conversations on dark web forums among black hat hackers and the...
  9. x32x01

    15 Powerful Gadgets For Ethical Hackers | Hardware Tools for Hackers in 2021

    Our in this platform we usually talk about various applications and their uses to check loopholes on systems. But penetration testers not only uses software applications, they also need some hardware to perform the tasks. In this detailed article we are going to cover hardware devices & gadgets...
  10. x32x01

    Evil Twin Attack with DNSMASQ - Wireless WPA2-PSK Cracking

    Ever heard of an evil twin AP? An evil twin AP is like a rogue access point. The attacker creates a fake wireless AP to lure users into thinking it’s a trusted wireless network. They amplify their signal in a way where the client will automatically connect to them because the beacons are faster...
  11. x32x01

    Exploit Windows with Malicious MS-OFFICE File [Metasploit Framework]

    Metasploit has for years supported encoding payloads into VBA code. (VBA, or Visual Basic for Applications, is the language that Microsoft Office macros are written in.) Macros are great for pentesters, since they don’t rely on a specific version, and they are a supported method of code...
  12. x32x01

    Create a Fake AP with DNSMASQ and HOSTAPD [Kali Linux]

    Do you ever think twice before connecting to a free public wireless hotspot at a coffee shop, airport, or hotel? Did you ever stop to wonder if the public Wi-Fi hotspot you just connected to is a legitimate one, or if it might be an Evil Twin hotspot in disguise? After setting up the fake AP...
  13. x32x01

    Sniffing with Rogue Access Point [DNSMASQ and TCPFLOW]

    Wireless networking is a complex field.With countless standards, protocols, and implementations, it is not uncommon for administrators to encounter configuration issues that require sophisticated troubleshooting and analysis mechanisms. Traditional network sniffing on an Ethernet network is...
  14. x32x01

    Live Packet Sniffing with Python [Search][Post Data]

    A sniffer is a program that monitors data traveling over a network. Unauthorized sniffers are dangerous to network security because they are difficult to detect and can be inserted almost anywhere, which makes them a favorite weapon of hackers. When used by malicious individuals, sniffers can...
  15. x32x01

    CTF - Billu B0x - Walkthrough step by step

    Billu:B0x VM is created by one of the most popular Indian Ethical Hacker named as “Manish Kishan Tanwar” (a.k.a Indishell Hacker) who has created so many web shells in PHP language hosted at Github.com. Download VM Link – https://www.vulnhub.com/entry/billu-b0x,188/ The very first step is to...
  16. x32x01

    Live Detection and Exploitation of WordPress xmlrpc.php File

    Being as popular cms, it is no surprise that WordPress is often always under attack. Some 70% of Techno’s top 100 blogs are using WordPress as a Content Management System. XML-RPC on WordPress is actually an API (Application program interface), remote procedure call which gives developers who...
  17. x32x01

    Palo Alto (PAN-OS) Exploitation CVE-2017-15944 - Live Demonstration

    Last year, a critical remote code execution vulnerability was found in Palo Alto Network Firewalls by Philip Pettersson. Palo Alto Network Firewalls has a component called as PAN-OS whose versions 6.1.18, 7.0.18, 7.1.13, 8.0.5 and earlier versions are core affected with this vulnerability. Palo...
  18. x32x01

    Get Free Public Wi-Fi - Bypass Mac Filtering

    Most of the time, you’re probably okay if you accidentally hit “Connect” on Free Public WiFi, as you’re just trying to connect to a machine that’s unwittingly rebroadcasting its own inability to connect. But most of the public WiFis are not working due to Mac Filtering, which means the MAC...
  19. x32x01

    Sniffing with Xerosploit - An Advanced MITM Framework

    Xerosploit is a penetration testing toolkit whose goal is to perform man in the middle attacks for testing purposes. It brings various modules that allow to realise efficient attacks, and also allows to carry out denial of service attacks and port scanning. With the help of Xerosploit, you can...
  20. x32x01

    DDOS a WiFi Network with MDK3 Tool in Kali Linux

    MDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses. MDK3 so called Murder Death Kill 3 is one of the most popular wireless hacking tool and specifically designed for WLAN Environments. The main operation of this tool is to flood the network with fake traffic...
Top