
MORAN
🇰🇪 Kenya's Ultimate platform for awesome Hacking tutorials 🔥, Latest CyberSecurity News🕵️, threat analysis and simulation 😝
How to Hack😎 all WIFI Networks🔥
Hackers😈 break into any WiFi Network, from pro to ScriptKiddie😤 Using AIRcrack-ng, Wifite and LazyScript-- Hacking WIFI Networks in 3 ways
How to DDoS💣 EVERYTHING!!😈
How to perform DDOS attacks and the different types of DDOS attacks, Tools like zmap, bash script and hping3 and how they work! How to DDoS!
Who is REvil Ransomware Group? 😈
Who is Revil Ransomware? Revil Ransomware cyberattacks Double extortion. With cybersecurity - russian ransomware groups and cybergangs -
How to Prep 🕤 for a RANSOMWARE ATTACK!☠️
Expert's insight on how to prepare & safeguard against ransomware attacks😤. These essential steps will prevent ransomware attacks,
How To Be a MASTER HACKER!😈
6 Steps to Master Hacking: OS, Networking, Linux, Programming, Basic Hacking, and Forensics. six essential steps to become a good hacker
Airgeddon: Hacking networks😈 with Pixie-Dust Attacks☠️
A pixie dust attack😈 is a way of brute forcing the eight digit pin. This attack allowed the recovery of the pin within seconds☠️
Spying🤫and Hacking😈 Bluetooth devices
Bluetooth hacking offers attackers😈 a window of opportunity to access confidential info on phones & tablets😋 by spying and exploitation
Cracking Passwords😈 like a pro😎 - Be a better crackhead😝
A hacker must retrieve the ciphertext value, often through man-in-the-middle attack, hacked credential databases, or phishing...lets crack
John the Ripper🚀: Lets do passwords🤫, salt☠️ and some crack😈
A popular offline password cracker is John the Ripper☠️ This baby enables hackers😈 to crack passwords, regardless if encrypted or hashed😋
h8mail🤖: How I found all your 😈 Hacked Google Passwords ☠️
Search hacked emails and passwords😝 dumped in databases for initial access 😈 on Organizations and which data dump compromised it! ☠️
Buffer Overflow☠️: C 😜how to build🛠️ a zero-day😈
Developing your own zero-day exploits☠️ is hard. Buffer overflows are the source of some of the most lethal exploits💀, particularly RCE😈
LaZagne🚀: Perform Post-exploitation😈 on any OS like a Queen👸
credentials is a high priority for hackers😈, most people reuse passwords. Those credentials can get hackers😈 deeper into a network
KOADIC🤖: For your Windows Post-Exploitation💀 zombies & Botnets needs😈
Koadic post-exploitation toolkit😈 is a fully-featured environment allows hackers☠️ to monitor and control😎 exploited Windows systems🥳
🎓BlackHats🏴☠️ -- 😈Let's build a Ransomware😏
😰 This ransomware will be very similar to Cryptolocker 😈 one of the most successful ransomware attacks in history 😣 Have fun😏
Honeypots⚱️: Spying on Hackers⚰️ & How to Avoid Them 😜
We set up a Honeypot⚱️, a system to attract hackers😈 so we can catch and analyze their actions against us😎
Cameradar🎥: Hack IP Cameras😈 --Be Omniscient --👻
😎 In hacking, always explore multiple methods to be successful. -- Persistence is a key hacker 😈 trait -- I show you how to hack Cameradar
Cracking games😈: Bypass Software Registration💀 --Easy Peazy-- 😜
Completely bypass the activation process 🥶 by making it skip the application's key code verification without a valid key😈
Kismet☠️: Disable Security Cameras😈 before any mischief😝
Today, I will show you how to disrupt😈 IoT devices by kicking them out of a network --- Cameras, Sex toys🍆, smart TVs etc ---🤪
Google-Hacking☠️: Find Passwords, Email lists & CCTVs in occupied Ukraine😈
You can hack devices😈 just by Googling the password to log in😝 thus possible to find files that contain critical information☠️
About Me
Welcome. MORAN is where I share with you what interests me most,Cyber security. This is a blog on the latest in the Infosec community and cyber security field as well as Proof of Concepts and Real life testimonials by professionals in the industry.

























