How to reveal a password that is already filled into the password textbox
How to brute-force a password protected zip file
How to generate a password list using crunch
How to enable write blocker on Windows for USB drive
Metasploit Framework a penetration testing framework
How to remove the Olpair.com Virus popup
Hacking Wireless Network with Kali
How to change the MAC address of your wireless card in Kali
List of recommended tools to install on Kali before pen-testing
How to setup proxychains and avoid detection
Information Gathering and Attack Strategies
Find vulnerability with Routerhunter
Vulnerability Assessment
Hacking with Armitage
Sploitus
Common Cryptographic Concepts and Terminology
Active Attack Vs. Passive Attack
Understanding Confidentiality, Integrity, Availability, Authentication, and Accountability
Understanding hash algorithms, message digest, and rainbow tables
SQL Injection with sqlmap
Exploit Microsoft Office 2007 - 2010 using Metasploit
How to create a fake online identity
Two ways to hack Facebook
How to hide data in audio files using DeepSound (Steganography)
Break open any Master Combo Lock in 8 tries or less
Top 10 things to do after installing Kali
How to hack and gain complete control over any Android device with AhMyth
How to hack Android device with Metasploit
How to hack Mac OSX with Metasploit
Hacking with SET toolkit
Hacking Windows with Backdoor Factory
How to remotely install a keylogger onto the victim's computer using Metasploit
WifiSlax - Wireless Penetration Testing Distro
Xiaopan - Wireless Penetration Testing Distro with GUI tool
DarkFly - Make installing security tool on Android easier
Computer Forensics with Kali Linux
Hijacker
BlackEye - Social Engineering Tool
Tracking People with Trape
Searching for CCTV Cameras in Termux
SocialBox - Bruteforce Social Media account
Hacking WiFi network with Fluxion
Th3inspector - Information Gathering Tool
Ghidra software reverse engineering (SRE) framework
Becoming a hacker or penetration tester
Hacking Android with Androspy
Kage - GUI for Metasploit
SilentGhost
HT-WPS Breaker - Crack Wireless Network
Dictionary attack against Instagram with InstaInsane
Hacking with Parat (RAT)
Phishing with Z-Shadow
Hacking Windows with CHAOS Framework
Track the exact location of the victim during Social Engineering with ISeeYou
How to create a keylogger with BeeLogger to hack Windows machine
Santet
How to generate a wordlist with Goblin Word Generator
Stealing the WPA2 Passphrase with Linset
Attacking Windows Telegram with TeleKiller
Finding the exact location of the victim with Seeker
Venom Shellcode Generator
Evade Anti-Virus with CarbonCopy
Test the strength of your password with password meter
Dictionary Attack Against FTP Server with FTPBruter
NanoCore (RAT) for Windows
Hacking with EasySploit
Malicious Trojan Generator
Lazymux - Installing Security Tool on Android the Easy Way
Open Source Information Facebook (OSIF)
BotKntD
Find SQL Injection Vulnerability with ScanQLi
HiddenEye - Phishing and Social Engineering Toolkit
PhishX - Phishing tool
Shodan.io
Censys.io
Penetration Testing Course
Computer Forensics
Advance Ethical Hacking
QRLJacking - Hacking WhatsApp
How to Reset an Acer BIOS Password
Hacktronian - Install Other Security Tools With Ease
Create a Windows Reverse Shell Backdoor Using WinSpy
Project iKy - Email Information Gathering Tool
Locator - Location Finder
Black-Hydra
SayCheese
MRKING
ANDRAX - Mobile Penetration Testing Platform
Look up private photo of people on Facebook that are not your friend
Exploit router with RouterSploit
BetterBackdoor Trojan Generator
Shellter - Metasploit Payload Encoder
The Fat Rat - Malware compiler
How to deliver a payload using JavaScript Injection attack
NoJlede: The Advanced Automated Pentesting And Forensics Tool
BackHAck - Backdoor Linux & Windows
Network Security / Ethical Hacking / IT Security Career Path
SayHello - Capture audio file from the target
RapidPayload - Metasploit Payload Generator
EZSploit - Linux bash script automation for Metasploit
Zphisher - an upgrade form of Shellphish
Tweetshell - Multi-thread brute force attack against Twitter account
Sherlock - Social Media information gathering tool
Tool-X - Hacking tool installer for Debian and Termux
Kali Linux Live USB with Persistence
Advance Phishing - Phishing tool with OTP bypass