How to Create a Self Replicating Worm
The worms and viruses are mostly coded in assembly language. This gives an advantage of smaller size and the speed optimizations and much...
10 Most Popular Methods Hackers Use to Hack Your Website
Pop quiz: what does Microsoft, Twitter, Facebook, NBC, ZenDesk, and Drupal all have in common? They’ve all been recently hacked. Yes,...
Information Gathering with Maltego in Kali Linux
Maltego is an open source intelligence and forensics application. This is a GUI tool so looks different. Maltego is an information...
10 Most Notorious Hackers of All Time
Feeling the holiday spirit today, and we are going to go over the best hacks/hackers of all time. There are many notable hackers around...
Changing File Permissions on a Computer
Alright, So I have taught you how to remote hack a computer, network, firewall, websites, etc.. All that good stuff! Once entering a...
How to Bypass a Firewall/Proxy
Hey guys, today I will be showing you multiple ways on how to bypass your school security measures with a few, easy-to-follow steps....
Advanced SQL Injection
Sql Injection – Hacking Website In this post we will hack a website and obtain its data using SQL injection attack. We will not use any...
Create a Simple C Program
The following program, which will be called number (but which could be named number.exe, program2, or anything else desired), is still...
Python Script: Making A Self-Replicating Virus
Description: How do viruses clone themselves to other computers? Let's take a look and learn how to write our own self-replicating...
Facebook Hacking Tool: Can this actually hack accounts? Let's find out!
Yes, you heard me right. A newly discovered Facebook hacking tool actually has the capability to hack Facebook account, but YOURS, and...