List Upvote

  • in ,

    Improve your hacking skills

    Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​Make your face unrecognizable

    You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​CalyxOS

    An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More

    Read More

    25 Points
    Upvote Downvote

Grid XXSmall

  • in ,

    Improve your hacking skills

    Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​Make your face unrecognizable

    You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​CalyxOS

    An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    Anonymous and encrypted file sharing

    AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​​How to steal passwords saved in Chrome

    Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More

    Read More

    25 Points
    Upvote Downvote
  • Popular

    in

    Best Android RAT in Termux

    HaxRat is a cloud-based Android remote control script based on NodeJS. With it, you can block calls on the device, see all files and pictures, listen to the microphone, monitor notifications and much more. Installation: $ apt install nodejs git $ git clone https://github.com/hax4us/haxRat.git $ cd haxRat/server $ npm install $ mkdir ~/haxrat Usage: $ […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    Copy any website in a couple of seconds

    Salute! httrack is a popular, simple and modern utility that allows you to copy any website to your device in a few commands. Installation: $ curl -LO https://raw.githubusercontent.com/Hax4us/httrack_In_termux/master/httrack Using: $ sh httrack You can read more about using the utility on the official GitHub page of the repository. Another way to copy website: CopySite is […] More

    Read More

    25 Points
    Upvote Downvote
  • in ,

    Spoofing Gmail address

    Salute! Today I’ll show you how you can spoof your Gmail email address. For this we need a utility called FAQUE. Installation: $ apt update $ apt install git -y $ git clone https://github.com/ByDog3r/FAQUE $ cd FAQUE Launch: $ bash faque.sh Using: • Choose a server, one of three • Specify the address from which […] More

    Read More

    25 Points
    Upvote Downvote
  • in ,

    Powerful phishing in TERMUX

    Salute! Shark is a tool that can help you make significant headway in phishing. Installation: Update the termux: $ apt update $ apt upgrade Next, download the git and go to the repository: $ git clone https://github.com/Bhaviktutorials/shark $ cd shark Launch: $ chmod + x * $ ./setup $ shark Let’s take an example. We […] More

    Read More

    25 Points
    Upvote Downvote
  • in ,

    Default Routers Passwords

    Passhunt – looking for default passwords from any router. Salute! The application database stores a sufficient number of passwords (2084 pieces) for logging into various routers of well-known manufacturers. Installation: $ apt update & apt upgrade $ pkg install git $ pkg install python2 python $ git clone https://github.com/Viralmaniar/Passhunt.git $ cd Passhunt $ pip3 install […] More

    Read More

    25 Points
    Upvote Downvote
  • in ,

    TERMUX hacker’s repository

    Hello everyone, today I will show you how you can install all the necessary “hacking tools”, literally in a few commands. Tools: nmap, hydra, sqlmap, metasploit, ngrok, kail nethunter, redhawk, cupp, weeman, fedora, ubuntu, etc. Installation: ▪️apt update && apt upgrade ▪️apt install git -y ▪️apt install python -y ▪️git clone https://github.com/AnonHackerr/toolss ▪️cd toolss ▪️chmod […] More

    Read More

    25 Points
    Upvote Downvote

Grid XXSmall Mod01

  • in ,

    Improve your hacking skills

    Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​Make your face unrecognizable

    You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​CalyxOS

    An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    Anonymous and encrypted file sharing

    AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​​How to steal passwords saved in Chrome

    Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More

    Read More

    25 Points
    Upvote Downvote

Grid XXSmall Mod11

  • in

    ​Make your face unrecognizable

    You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​CalyxOS

    An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    Anonymous and encrypted file sharing

    AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​​How to steal passwords saved in Chrome

    Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More

    Read More

    25 Points
    Upvote Downvote

Grid Small Mod03

  • in

    ​Make your face unrecognizable

    You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​CalyxOS

    Android 11 based anonymous OS

    An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    Anonymous and encrypted file sharing

    Private files transfer

    AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​​How to steal passwords saved in Chrome

    Still saving passwords in browser

    Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More

    Read More

    25 Points
    Upvote Downvote

Ordered Text List XSmall

  • in ,

    Improve your hacking skills

    Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​Make your face unrecognizable

    You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​CalyxOS

    An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    Anonymous and encrypted file sharing

    AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​​How to steal passwords saved in Chrome

    Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More

    Read More

    25 Points
    Upvote Downvote

Ordered Text List Medium

  • in ,

    Improve your hacking skills

    Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​Make your face unrecognizable

    You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​CalyxOS

    An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    Anonymous and encrypted file sharing

    AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​​How to steal passwords saved in Chrome

    Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More

    Read More

    25 Points
    Upvote Downvote

Ordered Text List XLarge

  • in ,

    Improve your hacking skills

    Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​Make your face unrecognizable

    You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​CalyxOS

    An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    Anonymous and encrypted file sharing

    AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​​How to steal passwords saved in Chrome

    Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More

    Read More

    25 Points
    Upvote Downvote

List XLarge

  • in ,

    Improve your hacking skills

    Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​Make your face unrecognizable

    You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More

    Read More

    25 Points
    Upvote Downvote

List

  • in ,

    Improve your hacking skills

    Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​Make your face unrecognizable

    You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​CalyxOS

    Android 11 based anonymous OS

    An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More

    Read More

    25 Points
    Upvote Downvote

List Small

  • in ,

    Improve your hacking skills

    Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​Make your face unrecognizable

    You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​CalyxOS

    Android 11 based anonymous OS

    An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More

    Read More

    25 Points
    Upvote Downvote

List Small 2 columns

  • in ,

    Improve your hacking skills

    Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​Make your face unrecognizable

    You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​CalyxOS

    Android 11 based anonymous OS

    An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    Anonymous and encrypted file sharing

    Private files transfer

    AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More

    Read More

    25 Points
    Upvote Downvote

List XXSmall : Module 01

List XXSmall : Module 02

List XXSmall : Module 03

List XXSmall : Module 21

Module 10 2of3

  • in ,

    Improve your hacking skills

    Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​Make your face unrecognizable

    You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​CalyxOS

    Android 11 based anonymous OS

    An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More

    Read More

    25 Points
    Upvote Downvote

Masonry

  • in ,

    Improve your hacking skills

    Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​Make your face unrecognizable

    You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​CalyxOS

    Android 11 based anonymous OS

    An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    Anonymous and encrypted file sharing

    Private files transfer

    AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​​How to steal passwords saved in Chrome

    Still saving passwords in browser

    Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More

    Read More

    25 Points
    Upvote Downvote
  • Popular

    in

    Best Android RAT in Termux

    Take Android under control

    HaxRat is a cloud-based Android remote control script based on NodeJS. With it, you can block calls on the device, see all files and pictures, listen to the microphone, monitor notifications and much more. Installation: $ apt install nodejs git $ git clone https://github.com/hax4us/haxRat.git $ cd haxRat/server $ npm install $ mkdir ~/haxrat Usage: $ […] More

    Read More

    25 Points
    Upvote Downvote

Zigzag

  • in ,

    Improve your hacking skills

    Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More

  • in

    ​Make your face unrecognizable

    You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More

Grid Small

  • in ,

    Improve your hacking skills

    Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​Make your face unrecognizable

    You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​CalyxOS

    Android 11 based anonymous OS

    An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    Anonymous and encrypted file sharing

    Private files transfer

    AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​​How to steal passwords saved in Chrome

    Still saving passwords in browser

    Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More

    Read More

    25 Points
    Upvote Downvote
  • Popular

    in

    Best Android RAT in Termux

    Take Android under control

    HaxRat is a cloud-based Android remote control script based on NodeJS. With it, you can block calls on the device, see all files and pictures, listen to the microphone, monitor notifications and much more. Installation: $ apt install nodejs git $ git clone https://github.com/hax4us/haxRat.git $ cd haxRat/server $ npm install $ mkdir ~/haxrat Usage: $ […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    Copy any website in a couple of seconds

    Salute! httrack is a popular, simple and modern utility that allows you to copy any website to your device in a few commands. Installation: $ curl -LO https://raw.githubusercontent.com/Hax4us/httrack_In_termux/master/httrack Using: $ sh httrack You can read more about using the utility on the official GitHub page of the repository. Another way to copy website: CopySite is […] More

    Read More

    25 Points
    Upvote Downvote

Grid Large

  • in ,

    Improve your hacking skills

    Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​Make your face unrecognizable

    You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​CalyxOS

    Android 11 based anonymous OS

    An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    Anonymous and encrypted file sharing

    Private files transfer

    AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More

    Read More

    25 Points
    Upvote Downvote

Grid

  • in ,

    Improve your hacking skills

    Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​Make your face unrecognizable

    You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​CalyxOS

    Android 11 based anonymous OS

    An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    Anonymous and encrypted file sharing

    Private files transfer

    AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More

    Read More

    25 Points
    Upvote Downvote
  • in

    ​​How to steal passwords saved in Chrome

    Still saving passwords in browser

    Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More

    Read More

    25 Points
    Upvote Downvote
  • Popular

    in

    Best Android RAT in Termux

    Take Android under control

    HaxRat is a cloud-based Android remote control script based on NodeJS. With it, you can block calls on the device, see all files and pictures, listen to the microphone, monitor notifications and much more. Installation: $ apt install nodejs git $ git clone https://github.com/hax4us/haxRat.git $ cd haxRat/server $ npm install $ mkdir ~/haxrat Usage: $ […] More

    Read More

    25 Points
    Upvote Downvote