7 Must have tools for every Hacker

All these tools provided here are free of cost,are tried hands on and are being actively developed by community,and if not,their alternatives are provided.To summarize it up, these are the 7 must have tools for every hacker

HEARTBLEED Bug Explanation

It is a critical bug in the OpenSSL's implementation of the TLS/DTLS heartbeat extension that allows attackers to read portions of the affected server’s memory, potentially revealing users data, that the server did not intend to reveal.

Beginners guide to hacking

The Basic And Advanced Steps of Hacking And Will Help You Develop The Hacker Attitude.You Will Learn Various Kinds Of Hacking

Just Fucking Google it .....

This is for people that ask how to hack facebook and how to unzip a file and how to sfix erorrs in kali linux , and how to hack a wep

Hacking Facebook Using Man in the Middle Attack

Hacking Facebook Using Man in the Middle Attack I will demonstrate how to hacking Facebook using MITM(Man in the Middle). This attack usually happen inside a Local Area Network(LAN) in office, internet cafe, apartment, etc.

Monday, March 31, 2014

[Free] Udemy - SQL Injection Master Course

Udemy - SQL Injection Master CourseEnglish | .MP4 | Audio: aac, 44100 Hz, stereo | Video: h264, yuv420p, 640x360, 30.03 fps® | 466 MBGenre: E-learning A complete guide to SQL Injection in which you will design your own lab and learn to attack it. Pentesting+hacking+SQLISQL Injection is one of oldest and powerful threat to Web application, yet there is no great explanation to solve the problem and a hands on guide to master SQL Injection. In...

3 Basic Tips to Prevent A DDoS Attack

Distributed denial-of-service (DDoS) attacks are always in top headlines worldwide, as they are plaguing websites in banks, and virtually of almost every organization having a prominent online presence. The main cause behind the proliferation of DDoS attacks is that there is a very low-cost that the attacker has to incur to put such attack in motion. Fortunately, today various prevention methods have been developed to tackle such attacks....

Sunday, March 30, 2014

Configure VPN In Kali Linux

VPN is not configure in Kali Linux. If u want to connect vpn in kali linux , first install pptp and network openvpn in kali linux using apt-get install. Command :apt-get install network-manager-openvpn-gnomeapt-get install network-manager-pptpapt-get install network-manager-pptp-gnomeapt-get install network-manager-strongswanapt-get install network-manager-vpncapt-get install network-manager-vpnc-gnome/etc/init.d/network-manager restar...

Friday, March 28, 2014

How To Clone a Sim Card

Sim Cloning is Illegal. This Post is Only  For Educational Use SIM cloning is the process in which a legitimate SIM card is duplicated. When the cloning is completed, the cloned SIM card's identifying information is transferred onto a separate, secondary SIM card. The secondary card can then be used in a different phone while having all calls and associated charges attributed to the original SIM card. The phrase...