Mouse not working, got stuck in Kali Linux or Ubuntu

Mouse not working, got stuck in Kali Linux or Ubuntu

Hello Guys, I know I just disappeared since sometimes.  So, sorry for that. But this time, I’m back with brand new tutorials of Kali Linux along with the videos.
read more
MAC Address Changer : Change MAC Address of Computer

MAC Address Changer : Change MAC Address of Computer

Hello guys, Before going to this let me explain a little bit about Mac Address. A Mac address is a unique address of every computer which is uniquely represents any system over a network. So here in this tutorial I...
read more
Hacked By GeNErAL

Hacked By GeNErAL

~!Hacked By GeNErAL alias Mathis!~ Hacked By GeNErAL   Greetz : Kuroi’SH, RxR, K3L0T3X \!/Just for Fun ~Hacked By GeNErAL\!/ Hacked By GeNErAL! !
read more
Hack Paypal account using Man in the Middle (MITM) Attack

Hack Paypal account using Man in the Middle (MITM) Attack

Hello guys in this tutorial we will learn hack paypal account using Man in the Middle (MITM) attack. Before going to this tutorial, let me explain how this attack works. It is a attack by which a hacker places himself...
read more
How to do Pivoting Attack

How to do Pivoting Attack

Hello guys in this tutorial you will learn how a attacker use victim as a Pivot to hack deeper into the network. In this scenario you will see that the Attacker does not have direct access to Server 2. So...
read more
BACKDOOR WITH PERSISTENT USING METASPLOIT FRAMEWORK

BACKDOOR WITH PERSISTENT USING METASPLOIT FRAMEWORK

Hello guys in this tutorial I will show you to create a backdoor with Persistent using Metasploit Framework, before  going to this tutorial let me explain little bit about Persistent. Actually Guys Metasploit contains two backdoors one is Persistent and...
read more
BYPASS ANTIVIRUS WITH METASPLOIT PENETRATION TESTING

BYPASS ANTIVIRUS WITH METASPLOIT PENETRATION TESTING

Hello guys. in my pervious tutorial of penetration testing we have seen to exploit windows using netapi or browser based exploit but this exploit does not able to bypass Antivirus or firewall of the windows. But guys in this tutorial...
read more
Hack facebook using Phishing attack

Hack facebook using Phishing attack

Hello guys today I am going to share a very important tutorial. In this tutorial, I will show you how to hack facebook. Before going to this tutorial, let me explain little bit about Phishing attack. Phishing attack is a computer based...
read more
Hack Remote pc using java applet EXPLOIT

Hack Remote pc using java applet EXPLOIT

Hello guys today in this tutorial we will see how to hack remote pc using JAVA Applet exploit with social Engineering Toolkit. This attack is also similar the Tabnabbing Attack and Credential Harvesting Attack . Before going to this tutorial...
read more
HACK GMAIL PASSWORD USING CREDENTIAL HARVESTER ATTACK

HACK GMAIL PASSWORD USING CREDENTIAL HARVESTER ATTACK

Hello guys today in this post we will see how to hack gmail password using Credential Harvester Attack Vector of Social Engineering Toolkit. This method is same as the tabnabbing attack. The first thing is that this attack is only...
read more