How to make money hacking without a degree

I’ve really been interested of the idea making money hacking without a degree, if all you are thinking this is not possible or you would consider yourself doing this oneday well, read below to find out. Bug Bounty’s Okay well for most of us it is hard to […]

WannaCry RansomeWare MS17 010 Metasploit

  This post demonstrates how to exploit a critical SMB vulnerability found in most windows systems, and was used by the ransomware named WannaCry, it basically encrypts the victim’s files and they are warned to pay the hackers $300 worth of bitcoins if they don’t it will be […]

How To Use Mailsploit v1.1 For Penetration Testing

Hi everybody, I’m going to talk about how to setup and use mailsploit v1.1, this python script is developed by me and if there are any bugs or problems please feel free to comment down the bottom. How Does It Work? Well, this is a python script, and […]

Bruteforcing Facebook Passwords

Hi friends, today i’m going to talk about how a hacker can bruteforce a facebook passwords. Prepping the attack before we get started, we need to download this script that will allow a cracker to gain access to Facebook accounts. Here is the command to type to download […]

Bypassing Anit-Virus Solutions Using TheFatRat & Activating The Webcam

Hi Friends, today i’m going to show you something very scary stuff I have researched. What is TheFatRat? TheFatRat is a console-based tool that can be downloaded from git hub. https://github.com/Screetsec/TheFatRat And what it simply does is bypasses anti-virus solutions by changing the signatures of a specially crafted […]

Social Engineering Toolkit – Credential Harvester Attack (Port-Forwarding)

Hey everybody, Today I’ll be talking about how hackers clone websites to steal passwords but instead of doing on your local network, i’m going to show you how you can do it to someone outside your local network. This method works for any attack in SET. Port Forwarding […]

BeEF-XSS framework – Stealing Gmail Passwords

Today I will show you how hackers use zombies to take over someones browser and gain full control of their browser. Your first question is probably, what is a zombie? well to answer this simply. A zombie is a compromised computer connected to the internet that a hacker uses […]

%d bloggers like this:
Skip to toolbar