Papers

/Papers

NetAttack- A Tool for Wireless Network Scan and Attack

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

The netattack.py is a python script that allows you to scan your local area for WiFi Networks and perform deauthentification attacks. The effectiveness and power of this script highly depends on your wireless card.
DE-AUTHENTIFICATION ATTACK

python netattack.py […]

By |April 13th, 2017|Papers|

How To Share Your Real-time Live Location With Anybody Using Facebook Messenger

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Real-time location sharing is a very important utility that was missing from Google Maps from a long time. Before bringing this feature to its Maps application, Google launched another app named Trusted Contacts that was a […]

By |April 6th, 2017|Papers|

10 Ways to You Can Use ls Command in Linux Terminal

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

 

ls is a two letter command both Unix users and sysadmins cannot live without. Whether you use it 1 time a day or 1000 times a day, knowing the power of the ls command can make […]

By |April 2nd, 2017|Papers|

WIBR+ – WiFi Hacking Tool For Android

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Today we are going to talk about an Android app that is used for hacking. WIBR+ is a free android app which is capable of cracking the WiFi passwords. It is basically designed to test the security […]

By |February 20th, 2017|Papers|

TinfoLeak – Full Information About A Twitter User Activity

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Tinfoleak is the best OSINT tool for Twitter, and is open-source. The latest updated version includes a lot of new and improved features.
Features

Search by coordinates.
Geolocated users.
Tagged users.
User conversations.
Identification in other social […]

By |January 18th, 2017|Papers|

How To perform Mass Mailer Attack using Setoolkit On Kali Linux

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan
What is mass mailer attack?
Mass mailer allow you to send emails to multiple individual in a list.The format is simple,it will email based of line.so it should look like the following:

massmailerattack@gmail.com
mass-mailing@gmail.com
mass-email@gmail.com
free-email-marketing@gmail.com
mass-email-sender@gmail.com
mass-email-service@gmail.com
email-blast@gmail.com
bulk-email-sender@gmail.com

This will continue through until it […]

By |January 10th, 2017|Papers|

Hakku Framework – Simple Penetration Testing Framework

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Hakku Framework is been made for penetration testing. It offers simple structure, basic CLI, and useful features for penetration testing tools developing. Hakku is written in python 3.5, and developed mainly on Arch Linux.
System Requirements

Python 3.5 and […]

By |January 10th, 2017|Papers|

Why Does 64-Bit Windows Need Two Program Files Folders — Program Files & Program Files (x86)

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Back in 2005, Microsoft launched both 32-bit and 64-bit versions of Windows operating system. This was done to support new 64-bit CPUs. The 64-bit CPUs have the ability to work with large numbers and access more […]

By |January 5th, 2017|Papers|

How To Find Out If Someone Is Secretly Using Your PC

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

You may not want to compromise your privacy by giving your personal computer to other as when you do so all your media and other secret files and their access is in other hands and you can’t […]

By |January 3rd, 2017|Papers|

MSF-Remote-Console – Tool To Connect To The Msfrcpd Server Of Metasploit

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules permanently as daemon on your server like autopwn2. Although it gives you […]

By |December 21st, 2016|Papers|