1.Create a new text file with note pad. REM ============================================================ REM @echo off title Rar Password Cracker mode con: cols=47 lines=20 copy “C:\Program Files\WinRAR\Unrar.exe” SET PSWD=0 SET DEST=%TEMP%\%RANDOM% MD %DEST% :RAR cls echo ———————————————- echo GET DETAIL echo ———————————————- echo. SET/P “NAME=Enter File Name : ” IF “%NAME%”==”” goto NERROR goto GPATH :NERROR echo ———————————————- … Read more

 About Penetration Testing 

Penetration testing is also known as pen testing or ethical hacking. It describes the intentional launching of simulated cyberattacks that seek out exploitable vulnerabilities in computer systems, networks, websites, and applications Following are the important modules of pentesting −Black Box Penetration TestingWhite Box Penetration TestingGrey Box Penetration TestingTypesExternal Network Penetration Testing.Internal Network Penetration Testing.Social Engineering … Read more

43 Best Useful Website collection for you

Among the best and most important 43 websites on the Internet that you can benefit from Sites that offer you courses in any field you want: • YouTube channels and websites that teach you through various videos: Learn a musical instrument: These sites give you random knowledge: Timing sites: cooking sites… Websites for learning languages: … Read more

Network and Web H*cking

Pentesting RoutersAttacking SSH with Metasploit, Nmap, Medusa, Hydra, NcrackSNMP attacksBypassing FirewallsPayloads and ShellsHTTP/HTTPS tunnelingPort Forwaring, Pivoting, Reverse ConnectsPrivilege Escalation and UAC bypassHash Dumping and MimikatzWindows Sessions, Stations and DesktopsImpersonation attacksWMIC post exploitationHidden bind shellsBitsadmin by Its_me_kaliBrowser Password RecoveryPAC AttacksDNS PoisoningVeil FrameworkDLL Injection using Appinit_DLLsStripping Manifest Files for DLL HijackingAttacking with DLL ForwardingAnti-Forensics techniquesSSL/TLS misconfigurationsCommand InjectionSQL … Read more

Hacking Myths vs Truth

Hacking Myths vs Truth

Myth 1 Hackers are always working alone. Truth:-Hackers may operate alone or as part of a group, such as a hacking collective or criminal organization. Myth 2 Hackers only want to steal confidential information. Truth:-Hackers might also want to mess with systems or do damage, like by launching a denial-of-service attack. Myth 3 Every hacker … Read more

Deep Dive AI Writing Lab Bundle Free Download

Deep Dive AI Writing Lab Bundle Free Download | Deep Dive AI Writing Lab Bundle Free Download 2023 What You Get?​ “Write Limitless, Original Books and Articles Using an Emerging AI-Technology SO Powerful, It Had to Be Approved By Congress!​ZERO Writing Skills? No Problem!“ Module 1: People, Prompts & Plots​Every story, whether fiction or non-fiction, needs a starting point. … Read more