This video shows a real life example of hacking my friend’s Windows 10 computer using an Android phone, I did this using a keystroke injection attack so when the phone is connected to the target computer it registers itself as …
Hydra is one of the most popular tools to run wordlist and brute force attacks, it supports a huge amount of services and can be used on all operating systems. This video will introduce you to this amazing tool, walk …
Most people use Hydra to run wordlist attacks, in this video however I’m going to show you an easier method to do this using burp suite.
Hello guys, In today’s video I will be showcasing a good mass scanner that uses facial recognition to find social accounts associated with a profile picture. This tool is pretty powerful when it comes to information gathering , watch the …
I made this video to answer a very common question that I get: What is the best operating system for hacking? is it Kali Linux? Parrot OS? and do real hackers use these operating systems?
Steganography is the practice of concealing messages or information within other non-secret text or data. In todays video I’m going to show you how to apply this in real life and hide text data inside an image!