ngrok

  1. x32x01

    How to install ShellPhish in Termux | How to use ShellPhish in Termux

    What is ShellPhish? A phishing attack is the most common attack to get access to the victim's credentials of any website.ShellPhish is one of the phishing tools that allows you to create a phishing link using termux.ShellPhish is created by richardsonjf and it's a project on Github.If you wanna...
  2. x32x01

    Hack Android Phone Using Termux with Metasploit and Ngrok

    How to Hack android phone using Termux with Metasploit. In this post, we are going to learn about how to hack android phones using termux with Metasploit. You can just copy-paste the commands one by one in the termux app and it will work perfectly. NOTE: This post is only for educational...
  3. x32x01

    How to Install & Use Ngrok on Kali Linux

    What is Ngrok ? Ngrok is a multi-platform application that provides us to forward our local development server to the internet without port forwarding. Ngrok hosts our locally hosted web server in to a subdomain of ngrok.com. That means we can easily show our localhost in the internet without...
  4. x32x01

    MSFVENOM - All payload examples - Cheatsheet 2021

    Msfvenom is a Metasploit Standalone Payload Generator which is a replacement of msfpayload and msfencode. Through msfvenom, you can generate any kind of shellcode/payload depending upon the platform/OS you want to hack. Often one of the most useful abilities of Metasploit is the msfvenom...
  5. x32x01

    Hack a website with Ngrok, Msfvenom and Metasploit Framework

    In a recent survey, only 15% of business owners saw security as a challenge when more than half had reported being hacked and of that, only 6% of small businesses don’t have anyone handling their online security. More people have access to the internet than ever before. This has prompted many...
  6. x32x01

    Hack Windows 10 Remotely over WAN with Metasploit [No Port Forwarding]

    In all of our previous Metasploit or Kali Linux post, We’re always performing attacks on LAN. Lots of users were asking us how to use Metasploit on the Internet over WAN. One way is to port forward the router. But today we’ll discuss one more method through which you can easily run Metasploit...
  7. x32x01

    How to Gain Access to an Android Over WAN

    Android phones are very easy to break into if the victim can be Social Engineered into doing so. If you use Kali, you may have done this but probably in your own network. This guide shows you how to do so but over HTTP tunneling to a phone anywhere in the world. Step 1 : Load Up Your Kali Shell...
Top