Just a Question : Anyone Knows the Tool That This Icon Belongs To?
I saw this "F" icon somewhere and i really want to know which tool's icon is it? The "F" icon Thanks in advance.
Contact me at D347HGUN on skype <br/>*Mainly specialized in reconnaissance and exploitation* still learning
I saw this "F" icon somewhere and i really want to know which tool's icon is it? The "F" icon Thanks in advance.
I noticed that lately there aren't that much interesting tutorials etc... So i thought maybe if you guys comment what you want to see and what tutorials you want to have then maybe the creators could have an idea on what you guys want to learn.
Well, i've been reading some books and stuffs about phishing and i learned alot BUT there is something i need help with, i know how to make a phishing page etc... but when the victim will log in of course he will be redirected to the real website or somewhere else, My question ...more
I was wondering: Will hacking change in a few years when we run out of IPV4 addresses and have to change to IPV6 addresses? i mean that surely is gonna have a great impact on Hacking, right? well maybe not, tell me what you think guys... Just a random pic for attention.
I was thinking about posting some of the tactics i thought about and that may work in different situations or special cases, But first i want to know if the null-byte community wants to see these, Also i kind off want that other members (OTW, Phoenix, Ciuffy, F.E.A.R, Ghost et ...more
I wanted to know if there's any alternatives to veil-evasion other than AVoid
So i wanted to ask, How come veil-evasion is always used by Hackers to bypass AV, i mean wouldn't it get detected eventually? And earlier this day i made a Payload and submitted it to an Online Scanner That doesn't distribute and it showed a detection rate of 23/47 Which means ...more
I've been thinking if its possible or not to craft a special webpage that has a direct download to a trojan or whatever and it automatically opens it without user interaction, Maybe it could be done using a Script or code in the webpage? Since i dont know how web applications ...more
Am trying to learn HTML and php and i thought is it possible make a fake login page on my server and when you write the username and pass and press submit or whatever it saves the creds on my server (like SET usually do) and it does contact the real website database to make th ...more
I was surfing some websites and reading about the latest tools and distro's and came across a kali linux 2.0 article, after i read it i went to check the comments and found this dude saying "v.2.0 is aimed towards script kiddies and nothing more. Since the release of 2.0, the ...more
I installed tightvncserver and ran it then I set up the password and all and when I tried connecting from vnc viewer from my phone I only get black lines crossing (I also got a grey screen) even after I tried vnc4server and I tried tweaking xstartup but no Chance, if anyone go ...more
i dont know what's the password, or the login, i just got the ssh server started, how can i login from my phone?
I Have an android KitKat phone and i wanted to use it with my pc for hacking, i already know about dsploit and wifikill and other "hacking" apps but i was thinking about something more kali like, and i know that there's Kali Nethunter but it isnt compatible with my device, And ...more
My isp is pretty old and i dont think it got it's database secured and honestly i dont think they care, so i need someone to help me in the process
How can i avoid this? Also is there any way to change the webserver address from my ip to an url for free?
Kali.jpg - Google Drive.
I would like to know how can i import custom payloads to Metasploit
Is there any way to use a hostname (no-ip) as lhost in metasploit payloads? because my ip is not exactly static so i want to use no-ip hostname to make it reachable even if it changed
I would like to know what are the most remotely exploited ports