alvin gitongaNov 26, 20231 min readCyber Warfare😈: Hacking SCADA🏭Threats of cyberwarfare & SCADA/ICS Hacking😈 different types of cyberattacks on SCADA/ICS & disruption Techniques🚀 -Hacking SCADA/ICS--
alvin gitongaNov 26, 20231 min readHow to Hack😎 all WIFI Networks🔥Hackers😈 break into any WiFi Network, from pro to ScriptKiddie😤 Using AIRcrack-ng, Wifite and LazyScript-- Hacking WIFI Networks in 3 ways
alvin gitongaNov 24, 20231 min readHow to DDoS💣 EVERYTHING!!😈How to perform DDOS attacks and the different types of DDOS attacks, Tools like zmap, bash script and hping3 and how they work! How to DDoS!
alvin gitongaNov 23, 20231 min readWho is REvil Ransomware Group? 😈Who is Revil Ransomware? Revil Ransomware cyberattacks Double extortion. With cybersecurity - russian ransomware groups and cybergangs -
alvin gitongaNov 22, 20231 min readHow to Prep 🕤 for a RANSOMWARE ATTACK!☠️Expert's insight on how to prepare & safeguard against ransomware attacks😤. These essential steps will prevent ransomware attacks,
alvin gitongaNov 20, 20232 min readHow To Be a MASTER HACKER!😈6 Steps to Master Hacking: OS, Networking, Linux, Programming, Basic Hacking, and Forensics. six essential steps to become a good hacker
alvin gitongaJul 23, 20235 min readAirgeddon: Hacking networks😈 with Pixie-Dust Attacks☠️ A pixie dust attack😈 is a way of brute forcing the eight digit pin. This attack allowed the recovery of the pin within seconds☠️
alvin gitongaJun 25, 20234 min readSpying🤫and Hacking😈 Bluetooth devicesBluetooth hacking offers attackers😈 a window of opportunity to access confidential info on phones & tablets😋 by spying and exploitation
alvin gitongaJun 12, 20234 min readCracking Passwords😈 like a pro😎 - Be a better crackhead😝A hacker must retrieve the ciphertext value, often through man-in-the-middle attack, hacked credential databases, or phishing...lets crack
alvin gitongaMay 20, 20234 min readJohn the Ripper🚀: Lets do passwords🤫, salt☠️ and some crack😈A popular offline password cracker is John the Ripper☠️ This baby enables hackers😈 to crack passwords, regardless if encrypted or hashed😋
alvin gitongaApr 30, 20233 min readh8mail🤖: How I found all your 😈 Hacked Google Passwords ☠️Search hacked emails and passwords😝 dumped in databases for initial access 😈 on Organizations and which data dump compromised it! ☠️
alvin gitongaApr 23, 20234 min readBuffer Overflow☠️: C 😜how to build🛠️ a zero-day😈Developing your own zero-day exploits☠️ is hard. Buffer overflows are the source of some of the most lethal exploits💀, particularly RCE😈
alvin gitongaApr 4, 20233 min readLaZagne🚀: Perform Post-exploitation😈 on any OS like a Queen👸 credentials is a high priority for hackers😈, most people reuse passwords. Those credentials can get hackers😈 deeper into a network
alvin gitongaApr 1, 20235 min readKOADIC🤖: For your Windows Post-Exploitation💀 zombies & Botnets needs😈 Koadic post-exploitation toolkit😈 is a fully-featured environment allows hackers☠️ to monitor and control😎 exploited Windows systems🥳
alvin gitongaMar 29, 20233 min read🎓BlackHats🏴☠️ -- 😈Let's build a Ransomware😏😰 This ransomware will be very similar to Cryptolocker 😈 one of the most successful ransomware attacks in history 😣 Have fun😏
alvin gitongaMar 26, 20233 min readHoneypots⚱️: Spying on Hackers⚰️ & How to Avoid Them 😜 We set up a Honeypot⚱️, a system to attract hackers😈 so we can catch and analyze their actions against us😎
alvin gitongaFeb 18, 20234 min readCameradar🎥: Hack IP Cameras😈 --Be Omniscient --👻😎 In hacking, always explore multiple methods to be successful. -- Persistence is a key hacker 😈 trait -- I show you how to hack Cameradar
alvin gitongaJan 28, 20232 min readCracking games😈: Bypass Software Registration💀 --Easy Peazy-- 😜Completely bypass the activation process 🥶 by making it skip the application's key code verification without a valid key😈
alvin gitongaJan 25, 20236 min readKismet☠️: Disable Security Cameras😈 before any mischief😝Today, I will show you how to disrupt😈 IoT devices by kicking them out of a network --- Cameras, Sex toys🍆, smart TVs etc ---🤪
alvin gitongaJan 23, 20235 min readGoogle-Hacking☠️: Find Passwords, Email lists & CCTVs in occupied Ukraine😈You can hack devices😈 just by Googling the password to log in😝 thus possible to find files that contain critical information☠️