
MORAN
🇰🇪 Kenya's Ultimate platform for awesome Hacking tutorials 🔥, Latest CyberSecurity News🕵️, threat analysis and simulation 😝
How to Hack😎 all WIFI Networks🔥
Hackers😈 break into any WiFi Network, from pro to ScriptKiddie😤 Using AIRcrack-ng, Wifite and LazyScript-- Hacking WIFI Networks in 3 ways
How to DDoS💣 EVERYTHING!!😈
How to perform DDOS attacks and the different types of DDOS attacks, Tools like zmap, bash script and hping3 and how they work! How to DDoS!
How to Prep 🕤 for a RANSOMWARE ATTACK!☠️
Expert's insight on how to prepare & safeguard against ransomware attacks😤. These essential steps will prevent ransomware attacks,
How To Be a MASTER HACKER!😈
6 Steps to Master Hacking: OS, Networking, Linux, Programming, Basic Hacking, and Forensics. six essential steps to become a good hacker
Airgeddon: Hacking networks😈 with Pixie-Dust Attacks☠️
A pixie dust attack😈 is a way of brute forcing the eight digit pin. This attack allowed the recovery of the pin within seconds☠️
Spying🤫and Hacking😈 Bluetooth devices
Bluetooth hacking offers attackers😈 a window of opportunity to access confidential info on phones & tablets😋 by spying and exploitation
Cracking Passwords😈 like a pro😎 - Be a better crackhead😝
A hacker must retrieve the ciphertext value, often through man-in-the-middle attack, hacked credential databases, or phishing...lets crack
John the Ripper🚀: Lets do passwords🤫, salt☠️ and some crack😈
A popular offline password cracker is John the Ripper☠️ This baby enables hackers😈 to crack passwords, regardless if encrypted or hashed😋
h8mail🤖: How I found all your 😈 Hacked Google Passwords ☠️
Search hacked emails and passwords😝 dumped in databases for initial access 😈 on Organizations and which data dump compromised it! ☠️
Buffer Overflow☠️: C 😜how to build🛠️ a zero-day😈
Developing your own zero-day exploits☠️ is hard. Buffer overflows are the source of some of the most lethal exploits💀, particularly RCE😈
LaZagne🚀: Perform Post-exploitation😈 on any OS like a Queen👸
credentials is a high priority for hackers😈, most people reuse passwords. Those credentials can get hackers😈 deeper into a network
KOADIC🤖: For your Windows Post-Exploitation💀 zombies & Botnets needs😈
Koadic post-exploitation toolkit😈 is a fully-featured environment allows hackers☠️ to monitor and control😎 exploited Windows systems🥳
🎓BlackHats🏴☠️ -- 😈Let's build a Ransomware😏
😰 This ransomware will be very similar to Cryptolocker 😈 one of the most successful ransomware attacks in history 😣 Have fun😏
Honeypots⚱️: Spying on Hackers⚰️ & How to Avoid Them 😜
We set up a Honeypot⚱️, a system to attract hackers😈 so we can catch and analyze their actions against us😎
Cameradar🎥: Hack IP Cameras😈 --Be Omniscient --👻
😎 In hacking, always explore multiple methods to be successful. -- Persistence is a key hacker 😈 trait -- I show you how to hack Cameradar
Kismet☠️: Disable Security Cameras😈 before any mischief😝
Today, I will show you how to disrupt😈 IoT devices by kicking them out of a network --- Cameras, Sex toys🍆, smart TVs etc ---🤪
Google-Hacking☠️: Find Passwords, Email lists & CCTVs in occupied Ukraine😈
You can hack devices😈 just by Googling the password to log in😝 thus possible to find files that contain critical information☠️
Lets hack😈 some Apache Tomcats😎 with Netcat😼
Apache Tomcat 🥳 is an opensource implementation of several Java technologies🤭 where Java code can run over HTTP. Today We will hack one!😈
Wireshark🦈: Spy on all smartphones☠️ on a Wi-Fi network😈
🦈 Decrypt WPA2 network traffic like a pro hacker so you can spy🧐 on the apps your target is using in real time😱
About Me
Welcome. MORAN is where I share with you what interests me most,Cyber security. This is a blog on the latest in the Infosec community and cyber security field as well as Proof of Concepts and Real life testimonials by professionals in the industry.

























