List Upvote
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
2.1k Views25 Votes
in AnonymityMake your face unrecognizable
You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More
-
2.2k Views25 Votes
in AnonymityCalyxOS
An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More
Grid XXSmall
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
2.1k Views25 Votes
in AnonymityMake your face unrecognizable
You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More
-
2.2k Views25 Votes
in AnonymityCalyxOS
An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More
-
1.8k Views25 Votes
in AnonymityAnonymous and encrypted file sharing
AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More
-
1.3k Views26 Votes
in Ethical HackingHow to steal passwords saved in Chrome
Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More
-
1.7k Views25 Votes
in Ethical HackingBest Android RAT in Termux
HaxRat is a cloud-based Android remote control script based on NodeJS. With it, you can block calls on the device, see all files and pictures, listen to the microphone, monitor notifications and much more. Installation: $ apt install nodejs git $ git clone https://github.com/hax4us/haxRat.git $ cd haxRat/server $ npm install $ mkdir ~/haxrat Usage: $ […] More
-
1.8k Views25 Votes
in Crypto, Ethical HackingHacking Crypto wallets
I will not be mistaken if say that after reading this article each of you will be able to try your luck and farm a dozen or so crypto-wallets with a balance. Well, if you were born under a lucky star, then it is quite possible that you will be able to hit the jackpot […] More
-
2k Views25 Votes
in Ethical HackingCopy any website in a couple of seconds
Salute! httrack is a popular, simple and modern utility that allows you to copy any website to your device in a few commands. Installation: $ curl -LO https://raw.githubusercontent.com/Hax4us/httrack_In_termux/master/httrack Using: $ sh httrack You can read more about using the utility on the official GitHub page of the repository. Another way to copy website: CopySite is […] More
-
1.5k Views26 Votes
in Cyber Security, Ethical HackingSpoofing Gmail address
Salute! Today I’ll show you how you can spoof your Gmail email address. For this we need a utility called FAQUE. Installation: $ apt update $ apt install git -y $ git clone https://github.com/ByDog3r/FAQUE $ cd FAQUE Launch: $ bash faque.sh Using: • Choose a server, one of three • Specify the address from which […] More
-
1.6k Views25 Votes
in Cyber Security, Ethical HackingPowerful phishing in TERMUX
Salute! Shark is a tool that can help you make significant headway in phishing. Installation: Update the termux: $ apt update $ apt upgrade Next, download the git and go to the repository: $ git clone https://github.com/Bhaviktutorials/shark $ cd shark Launch: $ chmod + x * $ ./setup $ shark Let’s take an example. We […] More
-
1.7k Views26 Votes
in Cyber Security, Ethical HackingDefault Routers Passwords
Passhunt – looking for default passwords from any router. Salute! The application database stores a sufficient number of passwords (2084 pieces) for logging into various routers of well-known manufacturers. Installation: $ apt update & apt upgrade $ pkg install git $ pkg install python2 python $ git clone https://github.com/Viralmaniar/Passhunt.git $ cd Passhunt $ pip3 install […] More
-
1.4k Views25 Votes
in Cyber Security, Ethical HackingTERMUX hacker’s repository
Hello everyone, today I will show you how you can install all the necessary “hacking tools”, literally in a few commands. Tools: nmap, hydra, sqlmap, metasploit, ngrok, kail nethunter, redhawk, cupp, weeman, fedora, ubuntu, etc. Installation: ▪️apt update && apt upgrade ▪️apt install git -y ▪️apt install python -y ▪️git clone https://github.com/AnonHackerr/toolss ▪️cd toolss ▪️chmod […] More
Grid XXSmall Mod01
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
2.1k Views25 Votes
in AnonymityMake your face unrecognizable
You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More
-
2.2k Views25 Votes
in AnonymityCalyxOS
An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More
-
1.8k Views25 Votes
in AnonymityAnonymous and encrypted file sharing
AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More
-
1.3k Views26 Votes
in Ethical HackingHow to steal passwords saved in Chrome
Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More
Grid XXSmall Mod11
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
-
2.1k Views25 Votes
in AnonymityMake your face unrecognizable
You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More
-
2.2k Views25 Votes
in AnonymityCalyxOS
An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More
-
1.8k Views25 Votes
in AnonymityAnonymous and encrypted file sharing
AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More
-
1.3k Views26 Votes
in Ethical HackingHow to steal passwords saved in Chrome
Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More
Grid Small Mod03
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
-
2.1k Views25 Votes
in AnonymityMake your face unrecognizable
You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More
-
2.2k Views25 Votes
in AnonymityCalyxOS
Android 11 based anonymous OS
An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More
-
1.8k Views25 Votes
in AnonymityAnonymous and encrypted file sharing
Private files transfer
AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More
-
1.3k Views26 Votes
in Ethical HackingHow to steal passwords saved in Chrome
Still saving passwords in browser
Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More
Ordered Text List XSmall
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
2.1k Views25 Votes
in AnonymityMake your face unrecognizable
You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More
-
2.2k Views25 Votes
in AnonymityCalyxOS
An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More
-
1.8k Views25 Votes
in AnonymityAnonymous and encrypted file sharing
AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More
-
1.3k Views26 Votes
in Ethical HackingHow to steal passwords saved in Chrome
Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More
Ordered Text List Medium
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
2.1k Views25 Votes
in AnonymityMake your face unrecognizable
You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More
-
2.2k Views25 Votes
in AnonymityCalyxOS
An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More
-
1.8k Views25 Votes
in AnonymityAnonymous and encrypted file sharing
AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More
-
1.3k Views26 Votes
in Ethical HackingHow to steal passwords saved in Chrome
Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More
Ordered Text List XLarge
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
2.1k Views25 Votes
in AnonymityMake your face unrecognizable
You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More
-
2.2k Views25 Votes
in AnonymityCalyxOS
An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More
-
1.8k Views25 Votes
in AnonymityAnonymous and encrypted file sharing
AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More
-
1.3k Views26 Votes
in Ethical HackingHow to steal passwords saved in Chrome
Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More
List XLarge
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
2.1k Views25 Votes
in AnonymityMake your face unrecognizable
You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More
List
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
2.1k Views25 Votes
in AnonymityMake your face unrecognizable
You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More
-
2.2k Views25 Votes
in AnonymityCalyxOS
Android 11 based anonymous OS
An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More
List Small
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
2.1k Views25 Votes
in AnonymityMake your face unrecognizable
You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More
-
2.2k Views25 Votes
in AnonymityCalyxOS
Android 11 based anonymous OS
An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More
List Small 2 columns
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
2.1k Views25 Votes
in AnonymityMake your face unrecognizable
You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More
-
2.2k Views25 Votes
in AnonymityCalyxOS
Android 11 based anonymous OS
An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More
-
1.8k Views25 Votes
in AnonymityAnonymous and encrypted file sharing
Private files transfer
AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More
List XXSmall
List XXSmall : Module 01
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
Make your face unrecognizable
-
CalyxOS
-
Anonymous and encrypted file sharing
List XXSmall : Module 02
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
Make your face unrecognizable
-
CalyxOS
-
Anonymous and encrypted file sharing
-
How to steal passwords saved in Chrome
List XXSmall : Module 03
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
Make your face unrecognizable
-
CalyxOS
-
Anonymous and encrypted file sharing
-
How to steal passwords saved in Chrome
-
Best Android RAT in Termux
-
Hacking Crypto wallets
-
Copy any website in a couple of seconds
-
Spoofing Gmail address
List XXSmall : Module 11
List XXSmall : Module 12
List XXSmall : Module 13
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
-
Make your face unrecognizable
-
CalyxOS
-
Anonymous and encrypted file sharing
-
How to steal passwords saved in Chrome
-
Best Android RAT in Termux
-
Hacking Crypto wallets
-
Copy any website in a couple of seconds
-
Spoofing Gmail address
List XXSmall : Module 21
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
Make your face unrecognizable
-
CalyxOS
-
Anonymous and encrypted file sharing
-
How to steal passwords saved in Chrome
-
Best Android RAT in Termux
-
Hacking Crypto wallets
-
Copy any website in a couple of seconds
List XXSmall : Module 31
List XXSmall : Module 32
Text List : Module 01
Text List : Module 02
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
-
-
-
-
-
-
-
Text List : Module 03
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
-
-
-
-
-
-
-
-
-
-
-
Text List : Module 11
Module 10 2of3
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
2.1k Views25 Votes
in AnonymityMake your face unrecognizable
You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More
-
2.2k Views25 Votes
in AnonymityCalyxOS
Android 11 based anonymous OS
An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More
Masonry
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
2.1k Views25 Votes
in AnonymityMake your face unrecognizable
You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More
-
2.2k Views25 Votes
in AnonymityCalyxOS
Android 11 based anonymous OS
An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More
-
1.8k Views25 Votes
in AnonymityAnonymous and encrypted file sharing
Private files transfer
AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More
-
1.3k Views26 Votes
in Ethical HackingHow to steal passwords saved in Chrome
Still saving passwords in browser
Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More
-
1.7k Views25 Votes
in Ethical HackingBest Android RAT in Termux
Take Android under control
HaxRat is a cloud-based Android remote control script based on NodeJS. With it, you can block calls on the device, see all files and pictures, listen to the microphone, monitor notifications and much more. Installation: $ apt install nodejs git $ git clone https://github.com/hax4us/haxRat.git $ cd haxRat/server $ npm install $ mkdir ~/haxrat Usage: $ […] More
-
1.8k Views25 Votes
in Crypto, Ethical HackingHacking Crypto wallets
I will not be mistaken if say that after reading this article each of you will be able to try your luck and farm a dozen or so crypto-wallets with a balance. Well, if you were born under a lucky star, then it is quite possible that you will be able to hit the jackpot […] More
Zigzag
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
by
AlcoTester
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
2.1k Views25 Votes
in AnonymityMake your face unrecognizable
by
Admin
You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More
Grid Small
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
2.1k Views25 Votes
in AnonymityMake your face unrecognizable
You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More
-
2.2k Views25 Votes
in AnonymityCalyxOS
Android 11 based anonymous OS
An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More
-
1.8k Views25 Votes
in AnonymityAnonymous and encrypted file sharing
Private files transfer
AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More
-
1.3k Views26 Votes
in Ethical HackingHow to steal passwords saved in Chrome
Still saving passwords in browser
Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More
-
1.7k Views25 Votes
in Ethical HackingBest Android RAT in Termux
Take Android under control
HaxRat is a cloud-based Android remote control script based on NodeJS. With it, you can block calls on the device, see all files and pictures, listen to the microphone, monitor notifications and much more. Installation: $ apt install nodejs git $ git clone https://github.com/hax4us/haxRat.git $ cd haxRat/server $ npm install $ mkdir ~/haxrat Usage: $ […] More
-
1.8k Views25 Votes
in Crypto, Ethical HackingHacking Crypto wallets
I will not be mistaken if say that after reading this article each of you will be able to try your luck and farm a dozen or so crypto-wallets with a balance. Well, if you were born under a lucky star, then it is quite possible that you will be able to hit the jackpot […] More
-
2k Views25 Votes
in Ethical HackingCopy any website in a couple of seconds
Salute! httrack is a popular, simple and modern utility that allows you to copy any website to your device in a few commands. Installation: $ curl -LO https://raw.githubusercontent.com/Hax4us/httrack_In_termux/master/httrack Using: $ sh httrack You can read more about using the utility on the official GitHub page of the repository. Another way to copy website: CopySite is […] More
Grid Large
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
2.1k Views25 Votes
in AnonymityMake your face unrecognizable
You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More
-
2.2k Views25 Votes
in AnonymityCalyxOS
Android 11 based anonymous OS
An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More
-
1.8k Views25 Votes
in AnonymityAnonymous and encrypted file sharing
Private files transfer
AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More
Grid
-
1.7k Views25 Votes
in Cyber Security, Ethical HackingImprove your hacking skills
Along with HackTheBox and TryHackMe 1. picoCTFpicoCTF is a cybersecurity research platform. On it, future ethical hackers can learn and compete in hacking skills. 2. OVERTHEWIREOverTheWire is suitable for everyone who wants to study the theory of information security and apply it in practice, regardless of their experience. Beginners should start with the Bandit level […] More
-
2.1k Views25 Votes
in AnonymityMake your face unrecognizable
You need to use your photo on the Internet, but you don’t want to be found through some Google pictures? Then use Fawkes – a program to change the photo so that the facial recognition algorithms do not recognize the person on it. To confuse the algorithms, the program changes the image at the pixel […] More
-
2.2k Views25 Votes
in AnonymityCalyxOS
Android 11 based anonymous OS
An operating system for mobile phones based on the Android 11 platform, freed from bindings to Google services and providing additional means to ensure privacy and security. Monthly generation of automatically installed updates, including current vulnerability fixes. Using the Signal messenger by default. Support for making encrypted calls via Signal or WhatsApp is built into […] More
-
1.8k Views25 Votes
in AnonymityAnonymous and encrypted file sharing
Private files transfer
AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The […] More
-
1.3k Views26 Votes
in Ethical HackingHow to steal passwords saved in Chrome
Still saving passwords in browser
Most users store their passwords directly in the browser, in the so-called “autofill forms” of Chrome. ChromePass is a specialized utility written in the Python programming language capable of “mining” saved passwords in Chrome. Installation:$ git clone https://github.com/bierschi/chromepass$ cd chromepass$ pip install -r requirements.txt$ python -m pip install –upgrade pip$ python -m pip install -r […] More
-
1.7k Views25 Votes
in Ethical HackingBest Android RAT in Termux
Take Android under control
HaxRat is a cloud-based Android remote control script based on NodeJS. With it, you can block calls on the device, see all files and pictures, listen to the microphone, monitor notifications and much more. Installation: $ apt install nodejs git $ git clone https://github.com/hax4us/haxRat.git $ cd haxRat/server $ npm install $ mkdir ~/haxrat Usage: $ […] More