Monthly Archives: January 2017

//January

TinfoLeak – Full Information About A Twitter User Activity

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Tinfoleak is the best OSINT tool for Twitter, and is open-source. The latest updated version includes a lot of new and improved features.
Features

Search by coordinates.
Geolocated users.
Tagged users.
User conversations.
Identification in other social […]

By |January 18th, 2017|Papers|

How To perform Mass Mailer Attack using Setoolkit On Kali Linux

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan
What is mass mailer attack?
Mass mailer allow you to send emails to multiple individual in a list.The format is simple,it will email based of line.so it should look like the following:

massmailerattack@gmail.com
mass-mailing@gmail.com
mass-email@gmail.com
free-email-marketing@gmail.com
mass-email-sender@gmail.com
mass-email-service@gmail.com
email-blast@gmail.com
bulk-email-sender@gmail.com

This will continue through until it […]

By |January 10th, 2017|Papers|

Hakku Framework – Simple Penetration Testing Framework

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Hakku Framework is been made for penetration testing. It offers simple structure, basic CLI, and useful features for penetration testing tools developing. Hakku is written in python 3.5, and developed mainly on Arch Linux.
System Requirements

Python 3.5 and […]

By |January 10th, 2017|Papers|

Why Does 64-Bit Windows Need Two Program Files Folders — Program Files & Program Files (x86)

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Back in 2005, Microsoft launched both 32-bit and 64-bit versions of Windows operating system. This was done to support new 64-bit CPUs. The 64-bit CPUs have the ability to work with large numbers and access more […]

By |January 5th, 2017|Papers|

How To Find Out If Someone Is Secretly Using Your PC

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

You may not want to compromise your privacy by giving your personal computer to other as when you do so all your media and other secret files and their access is in other hands and you can’t […]

By |January 3rd, 2017|Papers|