Honeypots⚱️: Spying on Hackers⚰️ & How to Avoid Them 😜
We set up a Honeypot⚱️, a system to attract hackers😈 so we can catch and analyze their actions against us😎
🇰🇪 Kenya's Ultimate platform for awesome Hacking tutorials 🔥, Latest CyberSecurity News🕵️, threat analysis and simulation 😝
We set up a Honeypot⚱️, a system to attract hackers😈 so we can catch and analyze their actions against us😎
😎 In hacking, always explore multiple methods to be successful. -- Persistence is a key hacker 😈 trait -- I show you how to hack Cameradar
Completely bypass the activation process 🥶 by making it skip the application's key code verification without a valid key😈
Today, I will show you how to disrupt😈 IoT devices by kicking them out of a network --- Cameras, Sex toys🍆, smart TVs etc ---🤪
You can hack devices😈 just by Googling the password to log in😝 thus possible to find files that contain critical information☠️
Apache Tomcat 🥳 is an opensource implementation of several Java technologies🤭 where Java code can run over HTTP. Today We will hack one!😈
🦈 Decrypt WPA2 network traffic like a pro hacker so you can spy🧐 on the apps your target is using in real time😱
Android phones can be weaponized💣 into covert hacking devices🏹 - like in MR. Robot - and used to war drive & Guerilla Hacking ops..😈
In this post, I show you how be one Absolute Unit of a Nuisance 😈 hacker on a network by spying on, DOS & MiTM hosts/users☠️Using Ettercap
Compromise a uTorrent client and make the target download a persistent backdoor👽 that execute when Windows 10 reboots😈
We look at how to hack the key secrets from a database😎 why?....data leaks!😈...think data for wikileaks, panama leaks, BGFI leaks...etc
Websites have databases full of confidential & valuable information 🧐 that can often be compromised😈 by SQL injection attacks 💉
BlueBorne is an attack vector by which hackers😈 can leverage Bluetooth connections to penetrate and take complete control over the target😋
Historically😰, known as one of the most widely spread and longest-standing Banking Trojans 😈with more than 14 years of activity☠️
🤨 A new Ducktail phishing campaign is spreading a new Windows info-stealer malware☠️ written in PHP to steal Facebook accounts and more
Hacking the Internet of things🚀🚀🚀 with Routersploit by Threat9😈
Using BeEF🐮 tool on Kali Lnux to hook browsers and harvest victims credentials of social media🤠 and any other logins😋
Burp Suite is a versatile and powerful tool for web app pentesting 😈 web form authentication testing, injection attacks, fuzzing..etc☠️
😈 Saturate and DoS Country's Internet with zmap 😲 a tool used to send millions of packets to clog the net of an entire region or country
Fast company was breached 😈 in a feud 🔥spanning some time with a security researcher. The hacker posted obscene🤬 stuff to users.
Welcome. MORAN is where I share with you what interests me most,Cyber security. This is a blog on the latest in the Infosec community and cyber security field as well as Proof of Concepts and Real life testimonials by professionals in the industry.