Video: Hacking your neighbours ADSL router is easier than you think

Watch: Hacking an ADSL router is this easy Majority of Internet users use average home ADSL router for broadband connection. Despite being the gatekeepers to your network, these ADSL routers can be easily hacked. This is because ADSL routers are low-cost consumer devices manufactured on the assembly lines somewhere in China without much of security investment…

How to Setup and run Kali-Linux on any Android Smartphone

Kali Linux is one the best love operating system of white hat hackers, security researchers and pentesters. It offers advanced penetration testing tool and its ease of use means that it should be a part of every security professional’s toolbox. Penetration testing involves using a variety of tools and techniques to test the limits of…

Here are the world’s top 10 Female Hackers

Meet the world’s Top 10 Female Hackers It is very surprising to know that a handful of women were bold enough to step into the world of hacking and make their presence felt – a field where the art of writing computer code and manipulating computer hardware is always considered to be traditionally dominated by…

USBDriveby: A Necklace That Can Hack Your PC In Just 60 Seconds

Short : In a video found on the YouTube channel of Samy Kamkar, a USB drive beaded in a necklace has been shown which is capable of doing some really dangerous hacking tricks with a horrifying outcome. This necklace is called USBDriveby, which is a necklace that can hijack your computer in just 60 seconds. USBdriveby…

How to program a virus in c++

Here I’m today with an another Post This time Specially For Our Visitors. Please the Code Down Is not to be used For any Wrong Purpose You are Yourself Responsible for, and Consequence That May Follow by the unauthorized use. Virus Making Is A crime and i don’t Take Any Clam over the Code it is not written By ME. #include…

Breaking WPA2-PSK with Kali Linux

WPA2-PSK may not be as safe as you think. There are a few attacks against WAP2-PSK. One of the most common attacks is against WPA2 is exploiting a weak passphrase. Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on…

Hacker reveals how to extract PIN of a smartphone from any selfie

Corneal Key Logger can extract PIN of any smartphone using the owner’s selfie If you thought biometrics was the ultimate weapon of authentication, you may be proved wrong by Starbug. German researcher Jan Krissler, aka Starbug is a hacker whose claim to fame is breaching Apple’s TouchID and recreating the German defense minister’s thumbprint from…

Best Hacking Apps For Android Phones

Short : As Android has emerged as the top mobile operating system, we have seen a great rise in the Android hacking apps. For our readers, we have prepared a list of the best hacking apps for Android that can be used by a technology enthusiast, an IT security administrator, or an ethical hacker. Based…