Extreme Hacking

We work in Dark, to serve the Light

Extreme Hacking /

How To Hack QR Code Of “Whatsapp Web” Using Phishing Technique In Kali Linux

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Whatsapp is the one of most popular messaging application available for almost all the operating system like windows,android,mac,blackberry etc…

For providing the access of whatsapp on browser,launched the whatsapp web,secured and protected with End To End Encryption.

There […]

By |December 17th, 2016|Papers|

Here’s How Your Sleeping Mac Can Be Hacked In 30 Seconds

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Last month, we told you how the Chinese security researchers were able to crack the security of Windows 10 browser, Adobe Flash, Safari, etc. in few seconds. This was followed by another news in December that […]

By |December 17th, 2016|Papers|

How To Repair Damaged/Corrupt MS Word, Excel, PowerPoint, And Outlook Files

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan
How to restore damaged or corrupt MS Word documents
Recovering the damaged or corrupt MS Word files isn’t something that any conventional data recovery software can accomplish. For this, you need to use some special tool. Here, I’m […]

By |December 17th, 2016|Papers|

How To Delete File Permanently Without Sending It To Recycle Bin In Windows 10?

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

When you delete a file or folder in Microsoft Windows, it goes to a special folder called Recycle Bin. Recycle Bin allows you to restore your deleted files, in case, you change your mind at a […]

By |December 17th, 2016|Papers|

ShellcodeCompiler C/C++ Compiler For Windows

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Shellcode Compiler is a program that compiles C/C++ style code into a small, position-independent and NULL-free shellcode for Windows. It is possible to call any Windows API function in a user-friendly way. It takes as input a source […]

By |December 5th, 2016|Papers|

How to Make a Bootable USB Flash Drive using Command Prompt

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Creating a USB pen drive using command prompt is not hard, it is one of the most common ways to create a bootable USB.

      This method does not work if your operating system is windows XP or windows 8 […]

By |December 4th, 2016|Papers|

idb – iOS App Security Assessment Tool

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

idb a tool to simplify some common tasks for iOS app security assessments and research.
Requirements:

Ubuntu or OS X
Ruby 1.9.3 or 2.1

Installation:
For OS X:
brew install qt cmake usbmuxd libimobiledevice
For Ubuntu:
apt-get install cmake libqt4-dev git-core libimobiledevice-utils libplist-utils […]

By |December 4th, 2016|Papers|

What Are DLL Files? Can I Download DLL Files From Internet To Fix Windows Errors?

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

In Windows-based PCs, very often we come across DLL file errors that don’t allow some software to run. We get error messages telling us that some particular .DLL file is missing. To solve this issue, we […]

By |December 3rd, 2016|Papers|

Here is How to Enable System Restore in Windows 10

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

The System restore feature is the one that lets you go back in time and undo the changes made. Mysteriously, this feature is disabled in Windows  10 by default. We ae not sire tif this is an […]

By |December 3rd, 2016|Papers|

Vproxy – Forward HTTP/S Traffic To Proxy Instance

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Vproxy is a python script tool which configures a PPTP VPN server that will redirect HTTP/HTTPS traffic to your proxy instance host.
System Requirements:

Kali Linux or any Linux distribution

Installation:
pip install termcolor
How to use:
Step 1: Setup VPN […]

By |November 30th, 2016|Papers|