alvin gitongaDec 11, 20225 min readUserLAnd💣: Weaponize your Android phone😈 - Hack on the move😎 Android phones can be weaponized💣 into covert hacking devices🏹 - like in MR. Robot - and used to war drive & Guerilla Hacking ops..😈
alvin gitongaNov 5, 20224 min readSqlmap 😈: Hacking MySQL & WordPress Sites😉 with SQL Injection 💉Websites have databases full of confidential & valuable information 🧐 that can often be compromised😈 by SQL injection attacks 💉
alvin gitongaNov 4, 20223 min readBlueBorne☠️: Lets Hack some Bluetooth😈BlueBorne is an attack vector by which hackers😈 can leverage Bluetooth connections to penetrate and take complete control over the target😋
alvin gitongaOct 16, 20224 min readRoutersploit🚀: Weaponize the Internet of Things😎...Hack the planet!😈Hacking the Internet of things🚀🚀🚀 with Routersploit by Threat9😈
alvin gitongaOct 14, 20223 min readBeEF🐮 : Hack social media accounts like a cowboy...Yeehaw!🤠Using BeEF🐮 tool on Kali Lnux to hook browsers and harvest victims credentials of social media🤠 and any other logins😋
alvin gitongaOct 9, 20227 min read🧐 Online Password Cracking 💥 with Burp Suite 😈Burp Suite is a versatile and powerful tool for web app pentesting 😈 web form authentication testing, injection attacks, fuzzing..etc☠️
alvin gitongaOct 1, 20222 min read😈 Saturate and DoS any Country's Internet with zmap 😲😈 Saturate and DoS Country's Internet with zmap 😲 a tool used to send millions of packets to clog the net of an entire region or country
alvin gitongaSep 27, 20223 min readAzureHunter 😜: The first step in Cloud Forensics 🧐AzureHunter - a Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
alvin gitongaSep 21, 20224 min readDoS Attacks☠️ against WiFi Access Points😈Here I show you how to attack and disrupt ☠️ any WIFI network whatsoever 😈
alvin gitongaAug 9, 20225 min readTor PART 2: ☠️ WELCOME to the DARK WEB 😈☠️ I walk you through the Dark web and its eeky dark corners where criminals. Spies and political dissidents lurk 😈
alvin gitongaAug 8, 20228 min read💉 SQL INJECTION ☠️ : Your Database is MINE! 😈😈 A walkthrough of how I can use SQL injection to completely take over your database 😈 and relevant mitigations.
alvin gitongaAug 6, 20228 min read🔥 CROSS-SITE SCRIPTING 🔥: How I will Hijack your website 😈☠️ A showcase of Cross-site scripting (XSS) and how it used to cause havoc on the internet today 😈
alvin gitongaAug 5, 20227 min read🔥 TOR 🔥: Be ANONYMOUS!🥷 🕵️ A part one introduction to staying anonymous online wit TOR browser.
alvin gitongaJul 31, 20223 min readGHIDRA: 🦅 NSA Reverse Engineering tool 🦅GHIDRA reverse engineering tool overview
alvin gitongaJul 30, 20224 min readTwitter-Hacking using Twint 🦅Twint to scrape twitter information of users with no API or sign up.
alvin gitongaJul 26, 20224 min readGOOGLE HACKING 🥷Today we learn how to seek and find sensitive information using google advanced search techniques in preparation for a pentest.
alvin gitongaJul 23, 20224 min readSHODAN: A Hacker's Guide 🥷 PART 2Welcome back Cyber Warriors! 🕵️ Last time we learnt about SHODAN, what it does and even did an example search where we landed on one of...
alvin gitongaJul 20, 20223 min readSHODAN: A Hacker's Guide 🥷A series of blogs to teach infosec how to use SHODAN in Hacking and Pentesting