How to Track Social Media Accounts by User Name Using Sherlock.

Sherlock is the platform that helps to retrieve all the social media account linked with any username across the social media platforms.

Read More
How To Access Android Phone Camera Using Kali Linux

In this tutorial, we will take a picture from the victim's smartphone camera without their knowledge. However, please note that this is post is for educational purposes and I have no responsibility for any illegal activity.

Read More
How to Anonymously Conceal Desired Data Within An Image Or Audio File.

Steganography is the art of hiding data in plain sight, and I'll show you how to do it with Steghide, a really easy command-line tool.

Read More
How To Access Password Protected Microsoft Files

Microsoft Office is one of the most used software programs in the world. It includes Microsoft Word, Excel, and PowerPoint, as well as Notebook, Outlook, Publisher, and Visio. Word, Excel, and Presentation are the vast commonly in use.

Read More
How to Get Information of Any Phone Number

There are various scenarios where you just have a phone number but you don’t who does it belong to. You may have used a true caller or application same as it but yet you were not able to find any information on that number. Here I am going to demonstrate a powerful tool known as phoneinfoga. To spice up a little bit here I am using google cloud console and docker in place of Kali Linux but you can use any Linux for this particular tool

Read More
How to Perform SQL Injection with Kali Linux

In this article, learn how you can perform SQL injection automatically and manually, how to mitigate them. The automated tool we are using here is sqlmap it’s an internal tool of Kali Linux. Before we jump into the practicals let’s clear some basics about SQL injection and sqlmap.

Read More
How to get user credentials using Bettercap

In this post, learn how to use different modules available in the Bettercap for obtaining the user credentials and how you can spoof dns for redirecting the victim to the desired target. Let’s start without further ado

Read More
The Real Way To Get Geo Location Of Any Device With Kali Linux

In this post, learn how to locate any device through Kali Linux using tools. Here, nGrok, sneeker, and IP locator tools are used. Before diving into the practical let’s take a look at some theoretical aspects.

Read More
How to Snoop With Kali Linux on Bluetooth devices

Bluetooth has become a major component of our lives. Bluetooth devices used every day by many individuals around the globe.

Read More
How to do Server Side Includes Injection (SSI) Using bWAPP

On the HTML page, SSI directives are used for dynamic content. SSIs are used to run some activities before loading the current page.

Read More
1 2 3
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram