
MORAN
🇰🇪 Kenya's Ultimate platform for awesome Hacking tutorials 🔥, Latest CyberSecurity News🕵️, threat analysis and simulation 😝
Wireshark🦈: Spy on all smartphones☠️ on a Wi-Fi network😈
🦈 Decrypt WPA2 network traffic like a pro hacker so you can spy🧐 on the apps your target is using in real time😱
UserLAnd💣: Weaponize your Android phone😈 - Hack on the move😎
Android phones can be weaponized💣 into covert hacking devices🏹 - like in MR. Robot - and used to war drive & Guerilla Hacking ops..😈
Ettercap🕵️: Intercept Passwords☠️ with ARP-Spoofing😈
In this post, I show you how be one Absolute Unit of a Nuisance 😈 hacker on a network by spying on, DOS & MiTM hosts/users☠️Using Ettercap
Hacking Torrent Clients😈 & Installing a Backdoor☠️ in their OS👽
Compromise a uTorrent client and make the target download a persistent backdoor👽 that execute when Windows 10 reboots😈
Sqlmap😈: Leaking sensitive info🤫 on MySQL & WordPress Sites😉
We look at how to hack the key secrets from a database😎 why?....data leaks!😈...think data for wikileaks, panama leaks, BGFI leaks...etc
Sqlmap 😈: Hacking MySQL & WordPress Sites😉 with SQL Injection 💉
Websites have databases full of confidential & valuable information 🧐 that can often be compromised😈 by SQL injection attacks 💉
BlueBorne☠️: Lets Hack some Bluetooth😈
BlueBorne is an attack vector by which hackers😈 can leverage Bluetooth connections to penetrate and take complete control over the target😋
Gozi malware 😈 mutates🤖 from bank account theft to initial access ☠️
Historically😰, known as one of the most widely spread and longest-standing Banking Trojans 😈with more than 14 years of activity☠️
🥷 New PHP stealer malware😈 targets Facebook accounts☠️
🤨 A new Ducktail phishing campaign is spreading a new Windows info-stealer malware☠️ written in PHP to steal Facebook accounts and more
Routersploit🚀: Weaponize the Internet of Things😎...Hack the planet!😈
Hacking the Internet of things🚀🚀🚀 with Routersploit by Threat9😈
BeEF🐮 : Hack social media accounts like a cowboy...Yeehaw!🤠
Using BeEF🐮 tool on Kali Lnux to hook browsers and harvest victims credentials of social media🤠 and any other logins😋
🧐 Online Password Cracking 💥 with Burp Suite 😈
Burp Suite is a versatile and powerful tool for web app pentesting 😈 web form authentication testing, injection attacks, fuzzing..etc☠️
😈 Saturate and DoS any Country's Internet with zmap 😲
😈 Saturate and DoS Country's Internet with zmap 😲 a tool used to send millions of packets to clog the net of an entire region or country
Hacker Confession😈: How they breached Fast Company’s site 😝
Fast company was breached 😈 in a feud 🔥spanning some time with a security researcher. The hacker posted obscene🤬 stuff to users.
AzureHunter 😜: The first step in Cloud Forensics 🧐
AzureHunter - a Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
DoS Attacks☠️ against WiFi Access Points😈
Here I show you how to attack and disrupt ☠️ any WIFI network whatsoever 😈
Uber ☠️PAWNED☠️ by a Teenager 😈
A deeper look into the Uber hack 😈 and how severe it is. ☠️ It's bad, the whole company was Pawned by a teenager 😋
PLAY Ransomware: A deep Analysis 🧐
POC & Analysis of attack on the Argentinian judicial system by a ransomware dubbed 'PLAY' as it appends '.play' on its encrypted files.
CodeRAT 😈: Dangerous malware now open-sourced for newbies 🧐
CodeRAT 😈 is now open source and available for the public on Github. Powerful tool built to attract scriptkiddies, newbies & cybercriminals
About Me
Welcome. MORAN is where I share with you what interests me most,Cyber security. This is a blog on the latest in the Infosec community and cyber security field as well as Proof of Concepts and Real life testimonials by professionals in the industry.

























