More stories

  • in

    How To Decompile and Embed Payload to Android Apk

    Decompile and Embed Payload to Android Apk I’m sure most of you, or at least those who have set a foot in the kingdom of hacking, have heard of Metasploit. From Wikipedia, The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. […] More

  • in

    8 Ways to Prepare for CSP (XSS Attacks)

    8 Ways to Prepare for CSP Cross-Site Scripting (XSS) is a critical threat that, despite widespread training, still plagues a large number of web sites. Preventing XSS attacks can get complicated but even a small effort can go a long way — a small effort that nevertheless seems to evade us. Still, developers are getting better at […] More

  • in

    The top 10 signs that your Son is a Hacker

    Is your Son a Computer Hacker? The top ten signs that your son is a hacker. I advise any parents to read this list carefully and if their son matches the profile, they should take action. A smart parent will first try to reason with their son, before resorting to groundings, or even spanking. I […] More

  • in

    Hack any Android Phone Using Metasploit on Kali Linux

    How To Hack Any Android Phone using Metasploit on Kali Linux? We knew that Hackers can Hack any device and any system but What about Android? As Penetration testers you need to learn all types of Hackings on different systems! In K4linux we will share with you a series of courses that will teach you […] More

  • in

    Essential Programming Languages for Hackers

    Learn Programming vs Learn Hacking: We get a hell lot of questions regarding“Learning to Hack” and “Which programming languages should I know to learn Hacking?”. So, today, we are going to discuss about some of The Essential Programming Languages which you should know in order to learn Hacking. So, let’s get started! Do you know […] More

  • in

    How to Choose which Programming Language to learn?

    Programming Language for Hacking: Learning a programming language is becoming an invaluable life skill. Just twenty years ago, could you have imagined coding being taught in some public schools? I mean, it was only in 1982 that the Commodore 64 came out! It seems like it must have been eons ago, but that’s well within […] More

  • in

    WhatsApp Hacked by Indian Security Researcher

    WhatsApp was Hacked ? WhatsApp, world’s leading cross-platform instant messaging client for smartphones got hacked by 21 years old security researcher – Balachandar Karthikeyan. This messaging service have a lot of features, but it always come with big responsibility. Since they got acquired by Facebook, they provide bug bounty and WhatsApp platform is under the […] More

  • in

    Kali Linux 2.0 Tools : jSQL Injection

    What is jSQL Injection ? jSQL Injection is a lightweight application used to find database information from a distant server. jSQL is free, open source and cross-platform (Windows, Linux, Mac OS X, Solaris). (adsbygoogle = window.adsbygoogle || []).push({}); Tools included in the jsql package jsql – A lightweight application used to find database information: A […] More

  • in

    The 7 Types of Penetration Testing:

    7 Penetration Testing Types : Today on k4linux we gonna talk about Penetration Testing Types! In our series of penetration testing cours with Kali Linux 2.0, you must know all terms and definitions and types of hackers to introduce this domains… many articles about penetration testing and hacking will be shared soon, keep connected with […] More

  • in

    Born to be Hacker Tshirts – Get yours Now!

    Born to be Hacker Tshirts: You are a Hacker or you like the Hack, you wear different clothes and you still want to be remarked, so “born to be Hacker” T-shirt is for you! Today is your lucky day! Let everyone know that you are different you’re unique and best! Yes … Hacking people are […] More

  • in

    Why Penetration Testing ?

    Why Penetration Testing ? Today on k4linux we gonna talk about Penetration Testing! In our series of penetration testing cours with Kali Linux 2.0, you must know all terms and definitions and types of hackers to introduce this domains… many articles about penetration testing and hacking will be shared soon, keep connected with k4linux and […] More

Load More
Congratulations. You've reached the end of the internet.