Welcome to hacking a rise in this post we are going to show you step by step to recovering deleted files or lost data from a reformatted partition or corrupted file system with Photorec. What is Photorec? Before we talk about how…
Introduction Hello and welcome to another post and in this one we will be going over raccoon-scanner. This is a high performance offensive security tool that is made for recon and vuln scanning, as they explain it. We’ll be going over how…
Introduction Hello and welcome to another post, today we are going to be talking about the tool already packed into ParrotSec and Blackarch. Well netmask is an address netmask generation utility as the developer likes to call it, its a great tool…
Introduction Hello and welcome to another post, in this one we will go over dnsmap and how it works. I hope you enjoy it!! What is dnsmap? dnsmap was originally released back in 2006 and was inspired by the fictional story “The…
Welcome back to another tutorial, today we will be making a script that flips a coin and randomly selects heads or tails. To start, make a new python file and name it CoinFlip, once you’ve done that you will need to import…
Get a Location using an IP adress Hey guys ! Lasr here 🙂 Today I’m gonna show you how to get the approximate location of an IP with iplocation.net. For this tutorial, you will need : A computer/smartphone/tablet with any OS…
hi and thankyou for joining us to night on darks dark guide to the dark net ( hahaha) for those that get the pun well done!!!! for the other younger members/readers its a pun from hitch hikers guide to the galaxy!! any…
Welcome Everyone, in today’s tutorial I will be teaching you how to make an IP finder using socket in Python. To start, fire up Pycharm and create a new file for this tutorial I named my file “IP”. next, we should import…
Welcome Friends Welcome back to another post and today we’ll be looking at the tool urlcrazy, this tool is used to: Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage. So basically…
Welcome Hello readers, welcome back to another post and today we are going to take a look at the tool sslscan which lets you query SSL services like HTTPS and SMTP to know what ciphers are supported. DISCLAIMER This post is for…
As hackers, we are often faced with the hurdle of cryptography and encryption. In some cases, we use it to hide our actions and messages. Many applications and protocols use encryption to maintain confidentiality and integrity of data. To be able to…
hi good day and welcome to my first walkthough on the HTB series today in this hack the box guide we are going to learn how to get the invite code on HTB as we all know you can’t simply just register…
good day hope your all well? a quick introduction i am darkgrumpyoldman over 20 years of IT experience both Windows and Linux mixed in with the IT experience i have got pen testing experience my main on here is really to teach…
Welcome back to another Python tutorial, in this tutorial you will learn how to output the mouse position to an alert. First, let’s start with the previous code we made. import time import pyautogui time.sleep(5) print(pyautogui.position()) From here lets replace ‘print(pyautogui.position()’ with…
Welcome to the tutorial Hello and welcome to this tutorial, in this I will show you how to use brut0s DFW. Now brut0s DFW is a simple doxing framework that makes profiles on people, in this tutorial I will show you how…
Linux is the server operating system of choice for top businesses including Facebook, Twitter, and Google. Linux is also the desktop OS of choice for many information security analysts and penetration testers due to its security, reliability, and configurability. Many network security…
right this ones for the script kiddies out there who wanna hit their mates off on xbox or some shit, ddosing can be useful occasionally but most of the time its kinda pointless. your gonna need a CentOS 6 latest VPS with…
Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own risks. DMCA take down cannot be possible as we are…