Security




How to reset Windows login password using the sethc and the cmd method

How to reveal a password that is already filled into the password textbox

How to brute-force a password protected zip file

How to generate a password list using crunch

How to enable write blocker on Windows for USB drive

Metasploit Framework a penetration testing framework

How to remove the Olpair.com Virus popup

Hacking Wireless Network with Kali

How to change the MAC address of your wireless card in Kali

List of recommended tools to install on Kali before pen-testing

How to setup proxychains and avoid detection

Information Gathering and Attack Strategies

Find vulnerability with Routerhunter

Vulnerability Assessment

Hacking with Armitage

Sploitus

Common Cryptographic Concepts and Terminology

Active Attack Vs. Passive Attack

Understanding Confidentiality, Integrity, Availability, Authentication, and Accountability

Understanding hash algorithms, message digest, and rainbow tables

SQL Injection with sqlmap

Exploit Microsoft Office 2007 - 2010 using Metasploit

How to create a fake online identity

Two ways to hack Facebook

How to hide data in audio files using DeepSound (Steganography)

Break open any Master Combo Lock  in 8 tries or less

Top 10 things to do after installing Kali

How to hack and gain complete control over any Android device with AhMyth

How to hack Android device with Metasploit

How to hack Mac OSX with Metasploit

Hacking with SET toolkit

Hacking Windows with Backdoor Factory

How to remotely install a keylogger onto the victim's computer using Metasploit

WifiSlax - Wireless Penetration Testing Distro

Xiaopan - Wireless Penetration Testing Distro with GUI tool

DarkFly - Make installing security tool on Android easier

Computer Forensics with Kali Linux

Hijacker

BlackEye - Social Engineering Tool

Tracking People with Trape

Searching for CCTV Cameras in Termux

SocialBox - Bruteforce Social Media account

Hacking WiFi network with Fluxion

Th3inspector - Information Gathering Tool

Ghidra software reverse engineering (SRE) framework

Becoming a hacker or penetration tester

Hacking Android with Androspy

Kage - GUI for Metasploit

SilentGhost

HT-WPS Breaker - Crack Wireless Network

Dictionary attack against Instagram with InstaInsane

Hacking with Parat (RAT)

Phishing with Z-Shadow

Hacking Windows with CHAOS Framework

Track the exact location of the victim during Social Engineering with ISeeYou

How to create a keylogger with BeeLogger to hack Windows machine

Santet

How to generate a wordlist with Goblin Word Generator

Stealing the WPA2 Passphrase with Linset

Attacking Windows Telegram with TeleKiller

Finding the exact location of the victim with Seeker

Venom Shellcode Generator

Evade Anti-Virus with CarbonCopy

Test the strength of your password with password meter

Dictionary Attack Against FTP Server with FTPBruter

NanoCore (RAT) for Windows

Hacking with EasySploit

Malicious Trojan Generator

Lazymux - Installing Security Tool on Android the Easy Way

Open Source Information Facebook (OSIF)

BotKntD

Find SQL Injection Vulnerability with ScanQLi

HiddenEye - Phishing and Social Engineering Toolkit

PhishX - Phishing tool

Shodan.io

Censys.io

Penetration Testing Course

Computer Forensics

Advance Ethical Hacking

QRLJacking - Hacking WhatsApp

How to Reset an Acer BIOS Password

Hacktronian - Install Other Security Tools With Ease

Create a Windows Reverse Shell Backdoor Using WinSpy

Project iKy - Email Information Gathering Tool

Locator - Location Finder

Black-Hydra

SayCheese

MRKING

ANDRAX - Mobile Penetration Testing Platform

Look up private photo of people on Facebook that are not your friend

Exploit router with RouterSploit

BetterBackdoor Trojan Generator

Shellter - Metasploit Payload Encoder

The Fat Rat - Malware compiler

How to deliver a payload using JavaScript Injection attack

NoJlede: The Advanced Automated Pentesting And Forensics Tool

BackHAck - Backdoor Linux & Windows

Network Security / Ethical Hacking / IT Security Career Path

SayHello - Capture audio file from the target

RapidPayload - Metasploit Payload Generator

EZSploit - Linux bash script automation for Metasploit

Zphisher - an upgrade form of Shellphish

Tweetshell - Multi-thread brute force attack against Twitter account

Sherlock - Social Media information gathering tool

Tool-X - Hacking tool installer for Debian and Termux

Kali Linux Live USB with Persistence

Advance Phishing - Phishing tool with OTP bypass