YouTube Censoring Hacking Content Policy Woes For a long time I've decided against talking much about this topic over fear of having my own account nuked. Over the weekend @TurvSec had his YouTube account
Tutorials Exploiting fully patched Office 2016 using CVE-2018-0802 What’s up guys? Microsoft recently released a security advisory which included a vulnerability in Microsoft Office 2016 which can allow a potential attacker to run code on a
Tutorials Hack Outlook with ZERO user interaction There’s definitely something more appealing about a hack that doesn’t require user interaction.. It just makes everything feel a bit more like its going to work.
Access Point What's that Fing on my network? Fing web shop and grab one for £125 (-$10 with code DEMMSEC10) Fingbox? So this little device can do so much and if you haven’t heard about
5 Eyes Best VPN 2017? What is a VPN, what is its purpose and why would you need one? With the everyday threat of having your information stolen from you, there are many ways
Tutorials Track any smartphone using a simple web page What you will need A server somewhere – I recommend a Digital Ocean VPS A domain name Setting everything up I’m assuming you’re already logged into
Fundamentals of TOR So we have all heard of TOR in some way or another, whether it being the wrong doings on the dark web, and is usually associated with bad people that
GoPhish Automate Phishing Emails with GoPhish A simple phishing toolkit created by Jordan Wright. That is a framework that allows the easy management of phishing campaigns. It even handles the malicious web pages that you create.
Tutorials HOW TO MAKE MALWARE UNDETECTABLE! (SHELLTER) This one is pretty simple if you’re using Windows. You can simply head over to the Shellter Website and download the binary and away you go… If
Password Password Managers So if you are anything like me then you would have had countless password resets due to forgetting them or the re-use of passwords, which not only is not safe
beginner hacking How to install Metasploitable 3 Metasploitable is a range of intentionally vulnerable virtual machines that you can use to learn about exploits and how to use Metasploit. Metasploitable 3 is quite a lot different from
PoshC2 - A fully powershell command and control server Installation PoshC2 is very easy to install. If you are using Windows 10 it may be worth disabling Windows Defender during the installation due to the PowerShell payloads bundled with
War Driving with Android (HOW DO PEOPLE STILL USE WEP!?!?!) I’ve gone back to my home city of Leeds over the holidays and I decided to try out an app I’ve had on my phone for
Lan Turtle Review I was lucky enough to get my hands on a LAN Turtle, the tiny Linux based computer disguised as a USB ethernet adapter. Specs Atheros AR9331 SoC at 400 MHz
Tutorials Steal Hashes with Bettercap To steal hashes with Bettercap there’s a few things we need to do first. In Kali we will need Bettercap and Responder. Responder is installed by default, but
hack locked pc How to make a Poison Tap (Hack locked Computers) Samy Kamkar released a tool which allows for a Raspberry Pi Zero to emulate a USB Ethernet device and steal cookies from a locked machine. We decided to make one