Inject Payload in any file

Inject Payload in any file In this article, I will show you how to inject a payloads of .exe into other files. Hope it will bring you a useful knowledge. Hello friends…If you want to learn something, you will have to work veryhard for it. Can not learn any work easily. Computer itself is very […]

What is Metasploit?

Introduction Metasploit is one of the most powerful tools used for penetration testing. Most of its resources can be found at − www.metasploit.com. It comes in two versions: commercial and free edition. There are no major differences in the two versions, so in this tutorial, we will be mostly using the Community version (free) of Metasploit. […]

Best apps for hacking an Android mobile

I suggest you Best apps for hacking an Android mobiles In many websites and blogs you will get lots of references of many android hacking Apps, But most of them hardly works, And almost all of them have some hidden tricks to make them work. In my site I have enlisted 7 Best Free Hacking […]

what is hacking?

Lecture_1 Hello guys! as I already posted that I will start posting so its the first post so lets start 🙂 This is our first lecture of basics what is hacking? Basically, hacking is a technique which a person use to find bugs loopholes and vulnerabilities in a technology related thing it could be a […]

How do you prevent your laptop from being hacked?

There are lot of ways with you can prevent your laptop from being hacked, antivirus is most powerfull to prvent and there are free antivirus software’s available in the market. Try to install it in your laptop so that you can avoid it from hacking. Here are the best free antivirus for laptops: Comodo Free […]

Definition of ‘Trojan’

Definition: Trojan or Trojan horse is the name given to a computer virus. It is a type of computer software that is camouflaged in the form of regular software such as utilities, games and sometimes even antivirus programs. Once it runs on the computer, it causes problems like killing background system processes, deleting hard drive […]

What is a Keylogger: A Brief on a Dangerous and Malicious Tool

What is a Keylogger What is a keylogger? At its most basic definition, a keylogger is a function which records or keystrokes on a computer. Taken at this basic level, a keylogger looks absolutely harmless. In the hands of a hacker or a cybercriminal, a keylogger is a potent tool to steal away your information. […]

Types of Computer Viruses

Types of Computer Viruses What is a Computer Virus ? A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user. Types of viruses :- The different types of viruses are as follows- 1) Boot Sector Virus :- Boot sector viruses infect […]

hacking dangrous virus

Creating a dangerous virus using notepad

Here I give you instructions of making a highly dangerous virus using notepad!! This virus has very very dangerous properties :- 1.Copy itself into startup 2.Copy itself over one thousand times into random spots in your computer. 3.Hide its self and all other created files 4.Task kill MSN, Norton, Windows Explorer, Limewire. 5.Swap the left […]

cracking

How to Prevent Hacking

How to Prevent Hacking 1. Do not use public WiFi/free WiFi. 2. Use data encryption settings. 3. Always keep your device/system updated. 4. Avoid visiting harmful sites. Install Avast Antivirus or any other antivirus extension in google chrome browser. 5. Avoid installing third party app. 6. Turn off Bluetooth when not in use. 7. Be […]