More stories

  • in

    C++ PROGRAMMING LANGUAGE FOR HACKERS – IF [2]

    Learn C ++ Programming Language For Hackers [Lesson 2] After the first Lesson about Learning C++ Programming Language For Hackers, today we will explain to you how to use IF statement on C++. (adsbygoogle = window.adsbygoogle || []).push({}); The ability to regulate the flow of your program, belongings it create selections on what code to […] More

  • in

    C++ Programming Language For Hackers – The Basics [1]

    Learn C ++ Programming Language For Hackers [Lesson 1] C++ could be a programing language of the many completely different dialects, the same as the means that every language has many various dialects. In C++, dialects aren’t as a result of the speakers board the North or South. Instead, it’s as a result of there […] More

  • in

    Kali Linux Tools : SFUZZ (Vulnerability Analysis)

    Kali Linux Tutorials : How To Use SFUZZ (Vulnerability Analysis)  Today on K4linux we are going to point out sfuzz (simple fuzzer) and the way to use it on Kali Linux! Simple fuzz specifically is what’s exactly what it looks like – a straightforward fuzzer. Do not mistake simple with a scarcity of fuzz capability. […] More

  • in

    Kali Linux Tutorials : Network PXE Install

    Booting up Kali Linux over Network – PXE Boot Today on K4linux we will talk about Booting and installing Kali over the network (PXE), in computing, the Preboot eXecution Environment (PXE) specification describes a standardized client-server environment that boots a software assembly, retrieved from a network, on PXE-enabled clients. On the client side it requires only a PXE-capable network interface […] More

  • in

    Kali Linux Tools : PowerFuzzer (Vulnerability Scanner)

    Powerfuzzer Web Application Vulnerability Scanner: Powerfuzzer is a highly automated and fully customizable web fuzzer (HTTP protocol based application fuzzer) based on many other Open Source fuzzers available and information gathered from numerous security resources and websites. It was designed to be user friendly, modern, effective and working. (adsbygoogle = window.adsbygoogle || []).push({}); Currently, it […] More

  • in

    The Most Dangerous Types of Social Engineering Attacks !

    The Best Types of Social Engineering Attacks That You Must Probably Know ! In the previous article we learned what social engineering is and the process used by a social engineer to perform a social engineering attack. In this article we will discuss the ways in which we can perform a social engineering attack. Basically, […] More

  • in

    Social Engineering : Hidden Secrets & Phases!

    All You Need To Know About Social Engineering Attacks: As we knew Social engineering it’s one of the must powerful attacks that many Hackers use. It is somehow shocking the first time one hears about “social engineering“. At least it was shocking for me. Hacking is thought of as an activity pursued solely, nocturnally, relentlessly, […] More

  • in

    Kali Linux Social Engineering Ebook [PDF]:

    Download Kali Linux Social Engineering Ebook [PDF]: Effectively perform efficient and organized social engineering tests and penetration testing using Kali Linux.  With this ebook you will be available to perform a social engineering attacks with SET using kali linux. This book contains instructions on how to perpetrate attacks with Kali Linux. These tasks are likely […] More

  • in

    How To Organize Information during a Penetration Testing?

    Penetration Testing With Kali Linux : Organizing Information In this article we will talk about how to organize Information during a penetration testing, we will use dradis.  In our series of penetration testing cours with Kali Linux 2.0, you must know all terms and definitions and types of hackers to introduce this domains … many articles about penetration testing and […] More

  • in

    NSA Website Was Hacked!

    NSA website goes down as hackers auction stolen ‘cyber weapons’ If you try to visit the NSA’s website right now, you’re in for a big disappointment. Because someone or something has made nsa.gov inaccessible to the outside world, and the United States’ National Security Agency has been struggling to get its website back online since […] More

  • in

    How To Decompile and Embed Payload to Android Apk

    Decompile and Embed Payload to Android Apk I’m sure most of you, or at least those who have set a foot in the kingdom of hacking, have heard of Metasploit. From Wikipedia, The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. […] More

Load More
Congratulations. You've reached the end of the internet.