Learn Ethical Hacking

[Ethical Hacking][bsummary]
latest posts

XNSPY vs Spyera: Which Hacking App to Pick

  Getting your hands on the right smartphone hacking app can be very tricky. This is because there are plenty of options to choose from, wit...

How to Crack Microsoft Office 365 License

Hello Everyone, Today’s article is on Cracking Microsoft Office 365 License. Usually, when you install office 365 you get 30 days of free...

OSCP Review – How To Pass OSCP on first Attempt

OSCP – Offensive security certified professional – Penetration testing with Kali Linux is a certification offered by offensive security. T...

SQL Injection Cheat sheet

Hello Everyone, below you can find the cheat sheet for sql injection, its more like sql injection techniques that I frequently use and it...

Buffer Overflow for OSCP - Exploiting SLmail

Hello Hackers, in this article I am going to explain buffer overflow windows 32-bit binary exploitation, its more of a cheat sheet kind ...

How to Brute force Shadow file hashes using John and Hashcat

Welcome hackers, here you go with one of the most interesting topics – cracking passwords. In this post, I am explaining the process of ...

Installing Impacket on Kali Linux

Hello, here is a simple step by step process of installing impacket on kali linux or any other Linux distortions. Impacket is a collec...

Linux Privilege Escalation Techniques

Hello everyone, below are the Linux Privilege Escalation Techniques. The below commands and techniques are the ones that I gathered when ...

Cheat Sheets

[Cheatsheet][grids]

Learn Hacking Wifi Networks

[How To Hack Wifi][grids]