Extreme Hacking

We work in Dark, to serve the Light

Extreme Hacking /

WIBR+ – WiFi Hacking Tool For Android

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Today we are going to talk about an Android app that is used for hacking. WIBR+ is a free android app which is capable of cracking the WiFi passwords. It is basically designed to test the security […]

By |February 20th, 2017|Papers|

TinfoLeak – Full Information About A Twitter User Activity

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Tinfoleak is the best OSINT tool for Twitter, and is open-source. The latest updated version includes a lot of new and improved features.
Features

Search by coordinates.
Geolocated users.
Tagged users.
User conversations.
Identification in other social […]

By |January 18th, 2017|Papers|

How To perform Mass Mailer Attack using Setoolkit On Kali Linux

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan
What is mass mailer attack?
Mass mailer allow you to send emails to multiple individual in a list.The format is simple,it will email based of line.so it should look like the following:

massmailerattack@gmail.com
mass-mailing@gmail.com
mass-email@gmail.com
free-email-marketing@gmail.com
mass-email-sender@gmail.com
mass-email-service@gmail.com
email-blast@gmail.com
bulk-email-sender@gmail.com

This will continue through until it […]

By |January 10th, 2017|Papers|

Hakku Framework – Simple Penetration Testing Framework

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Hakku Framework is been made for penetration testing. It offers simple structure, basic CLI, and useful features for penetration testing tools developing. Hakku is written in python 3.5, and developed mainly on Arch Linux.
System Requirements

Python 3.5 and […]

By |January 10th, 2017|Papers|

Why Does 64-Bit Windows Need Two Program Files Folders — Program Files & Program Files (x86)

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Back in 2005, Microsoft launched both 32-bit and 64-bit versions of Windows operating system. This was done to support new 64-bit CPUs. The 64-bit CPUs have the ability to work with large numbers and access more […]

By |January 5th, 2017|Papers|

How To Find Out If Someone Is Secretly Using Your PC

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

You may not want to compromise your privacy by giving your personal computer to other as when you do so all your media and other secret files and their access is in other hands and you can’t […]

By |January 3rd, 2017|Papers|

MSF-Remote-Console – Tool To Connect To The Msfrcpd Server Of Metasploit

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules permanently as daemon on your server like autopwn2. Although it gives you […]

By |December 21st, 2016|Papers|

Cain and Abel – An amazing Tool for Hackers

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Cain and Abel is an amazing tool that is specifically designed for network administrators and penetration testers to recover various kinds of passwords. It allows easy recovery of passwords by sniffing the network, cracking encrypted passwords […]

By |December 20th, 2016|Papers|

Morpheus – Automated Ettercap TCP/IP Hijacking Tool

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Morpheus is a framework tool which automates TCP/UDP packet manipulation tasks by using etter filters to manipulate target requests/responses under MitM attacks replacing the TCP/UDP packet contents by our contents before forward the packet back to […]

By |December 20th, 2016|Papers|

What Is Windows Page File? Will Disabling It Make My PC Faster?

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

What Is Windows page file? How does it work?
Windows Page File, also called a paging file or a swap file, is a file that’s used to store data temporarily. The page file turns out to be […]

By |December 19th, 2016|Papers|