In Today’s video I’ll be showcasing one of the best phishing tools , you can literally clone any website or login page you want ! , I am doing this video for education purposes only. Enjoy https://www.youtube.com/watch?v=h7oppHfILZE Tool Link …
In this video I’m going to show you how to use Ngrok to receive reverse connections and hack computer over the internet, even if they are not connected to the same network.
Information gathering is an important phase in the process of hacking. In this video I’m going to show you how to discover all social media accounts related to a specific username using a tool called Sherlock. This information can be …
Shodan is a search engine for devices, it can be used to discover devices connected to the internet, be it a camera, a personal computer, a server, a router, a smart device like a fridge, or even industrial control systems …
Often, an exploitation of a vulnerability might lead to a disaster recovery scenario. Therefore, it is imperative to have a system in place that can prevent the vulnerabilities from being exploited in the first place. But how can you prevent …
This year in BlackHat London 2019, I presented my tool Octopus in BlackHat Arsenal, and it was really fun to present the tool in front of some talented hackers and hear a feedback about the tool from them. So I just …