Kali linux Toolkit

Top 10 Kali linux Toolkit Information Gathering Vulnerability Analysis Web Applications Password Attacks Wireless Attacks Exploitation Tools Sniffing/Spoofing Maintaining Access Reverse Engineering Stress Testing Hardware Hacking Forensics Reporting Tools System Services Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. Since there is no patch for human stupidity, this is Read more about Kali linux Toolkit[…]

Website HackingTricks

SQL Injection in MySQL Databases:- SQL Injection attacks are code injections that exploit the database layer of the application. This is most commonly the MySQL database, but there are techniques to carry out this attack in other databases such as Oracle. In this tutorial i will be showing you the steps to carry out the Read more about Website HackingTricks[…]

White Hat Hacker

What does White Hat Hacker mean? A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them. Although the methods used Read more about White Hat Hacker[…]

The 7 Most Wanted Iranian Hackers By the FBI

On January 21, 2016, a grand jury in the Southern District of New York indicted seven Iranian nationals for their involvement in conspiracies to conduct a coordinated campaign of distributed denial of service (“DDoS”) attacks against the United States financial sector and other United States companies from 2011 through 2013.  Each defendant was a manager Read more about The 7 Most Wanted Iranian Hackers By the FBI[…]

Facebook Ads now Tracks you, Even if you don’t have an Account

Facebook Ads now Tracks you, Even if you don’t have an Account There’s nowhere to hide across the web, especially from the marketing and advertising companies. If you are paranoid about your privacy, you may get upset to know that Facebook will now track and deliver targeted Ads on other apps and websites for everyone, Read more about Facebook Ads now Tracks you, Even if you don’t have an Account[…]

Apps for detect hidden camera in changing room

Apps for detect  hidden camera in  changing room Disclaimer – Please read before continue.. Detecting camera using radiation/magnetism provides you magnetic activity from nearby device. Results may not be accurate. User intervention is required in that case. Results are also subject to device sensor capability How to use this app. How to find camera ? Read more about Apps for detect hidden camera in changing room[…]

Latest trozons 2016

HACKERS ARE NOTHING if not persistent. Where others see obstacles and quit, hackers brute-force their way through barriers or find ways to game or bypass them. And they’ll patiently invest weeks and months devising new methods to do so. There’s no Moore’s Law for hacking innovation, but anyone who follows cybersecurity knows that techniques get bolder Read more about Latest trozons 2016[…]