Pinterest

Explore Hacker News, Computer Network, and more!

Hacker Tools ☣ on Twitter: "Lobotomy - Android Reverse Engineering Framework & Toolkit https://t.co/EEAgAs9ePy #Android #Apktool #Linux https://t.co/X0EMOXRz5f"

Hacker Tools ☣ on Twitter: "Lobotomy - Android Reverse Engineering Framework & Toolkit https://t.co/EEAgAs9ePy #Android #Apktool #Linux https://t.co/X0EMOXRz5f"

Embedded

Lynis - Security Auditing Tool for Unix/Linux Systems

Estos códigos secretos te darán acceso a funciones ocultas de tu móvil

13 Funciones ocultas de tu móvil que no sabías que existían

Estos códigos secretos te darán acceso a funciones ocultas de tu móvil His Secret Obsession Earn Commissions On Front And Backend Sales Promoting His Secret Obsession - The Highest Converting Offer In It’s Class That is Taking The Women’s Market By Storm

Never run out of iPhone photo space again

Never run out of iPhone photo space again

XFLTReaT - Tunnelling Framework

XFLTReaT - Tunnelling Framework

Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security ☣

The iPhone is a device that comes with a ton of secret features that you would never have guessed it would include. Read to learn a some of iPhone secrets.

30 Incredible Things Your iPhone Can Do

12 tricks you didn't know your iphone could do. my favorite: When you want to type a number, it is inconvenient to switch to numbers, type one number and then switch back to normal keyboard. If you pres

Ubuntu MATE ya es un “sabor” oficial de Ubuntu

A community developed, Ubuntu based operating system that beautifully integrates the MATE desktop.

How to Crack Wi-Fi Passwords—For Beginners! « Hacks, Mods & Circuitry

How to Crack Wi-Fi Passwords—For Beginners!

How to Crack Wi-Fi Passwords—For Beginners! « Hacks, Mods & Circuitry

80+ Best Free Hacking Tutorials | Resources to Become Pro Hacker | FromDev.  WITH GREAT POWER COMRS GREAT R ESPONSIBILITY

80+ Best Free Hacking Tutorials

Best Free Hacking Tutorials Resources to Become Pro Hacker FromDev

Blisqy - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB).

Blisqy - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB)

Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security ☣

parrot best hacking distro operating system

A security-focused operating system is a hacker's best companion as it helps them to discover the weaknesses in computer systems or computer networks.

PowerOPS – Powershell for Offensive Operations.

PowerOPS – Powershell for Offensive Operations.

BEST PASSWORD CRACKING TOOLS

We have prepared a list of the top 10 password cracking tools that are widely used by ethical hackers and cybersecurity experts. These tools include the likes of Aircrack, John the Ripper, and THC Hydra.

Welcome back, my greenhorn hackers! Recently, I asked the Null Byte community what subject they would most like me to cover in future tutorials. Many of you cited scripting, and I decided it's best to cover this subject soon, so here goes. Any self-respecting hacker must be able to script. For that matter, any self-respecting Linux administrator must be able to script. With the arrival of the Windows PowerShell, Windows administrators are increasingly required to script as well perform ...

Hack Like a Pro: Scripting for the Aspiring Hacker, Part 1 (BASH Basics)

Hack Like a Pro: Scripting for the Aspiring Hacker, Part 1 (BASH Basics) « Null Byte