AndroRAT: Hacking Mobile Phones
Man wearing Anonymous mask in a server room

AndroRAT: Hacking Mobile Phones

How to Hack Mobile Phones with AndroRAT Hacking Android devices is scarily easy, and we are going to show you just how it is done with a tool called AndroRAT. After reading this guide if you're an Android user, hopefully you will think twice about cyber criminals and the dangers of accepting third-party software on to your devices. This is an ethical hacking guide, for educational purposes only. Stay on the right side of the law guys.AndroRAT "AndroRAT" is short…

0 Comments
Computer Hacking: An Ethical Hacking Guide
Man wearing Anonymous mask in a server room

Computer Hacking: An Ethical Hacking Guide

Basic Steps to Computer Hacking Introduction This guide is all about computer hacking, and how the cyber criminals gain access to our systems. Basically, to hack into any computer, we need to find a weakness. We find weaknesses by scanning the system for vulnerabilities. Once vulnerabilities are found they can be researched and then exploited. In this Ethical hacking guide, we will be using the Kali Linux operating system and any steps provided will be explained using Kali.Disclaimer: This guide…

0 Comments
Snort: Complete Guide to Using Snort
Ethical Hacking-Snort

Snort: Complete Guide to Using Snort

What is Snort? Snort is an open-source, highly versatile intrusion detection system (IDS) and intrusion prevention system (IPS) software for network security. It is designed to monitor network traffic and analyze it for signs of suspicious or malicious activity.Here's a brief explanation of what Snort is used for: Intrusion Detection: Snort can passively monitor network traffic in real-time and analyze it for patterns or signatures that match known threats or attack patterns. When it detects such activity, it can generate…

0 Comments
Automated Hacking Tools for Hackers
Man wearing Anonymous mask in a server room

Automated Hacking Tools for Hackers

What are Automated Hacking Tools? Automated hacking tools, also known as hacking scripts or cyberattack automation tools, are software programs or scripts designed to assist cybercriminals and hackers in carrying out various malicious activities in an automated fashion. These tools are often used to exploit vulnerabilities in computer systems, networks, or applications for unauthorized access, data theft, or other malicious purposes. They also have their purpose in the Ethical Hacking world.Here's a brief overview of some common types of automated…

2 Comments
Google Dorks: Learn to Enhance your OSINT Skills
Ethical Hacking-Google

Google Dorks: Learn to Enhance your OSINT Skills

What are Google Dorks? "Google Dorks" is a term used to describe specific search queries that users can input into the Google search engine to find information that might not be easily accessible through conventional search queries. These queries are often used by security professionals, researchers, and hackers to discover vulnerabilities and sensitive information on websites and web servers. Google Dorks are extremely valuable for OSINT during Ethical Hacking.Google Dorks typically involve the use of advanced search operators and keywords…

0 Comments
OSINT: An Introduction to Open Source Intelligence
Man wearing Anonymous mask in a server room

OSINT: An Introduction to Open Source Intelligence

What is OSINT? OSINT, or Open-Source Intelligence, is the process of collecting and analyzing information from publicly available sources to gather insights and intelligence. It is a critical component of many fields, including law enforcement, cybersecurity, journalism, and competitive analysis. OSINT relies on open sources of information, which means data that is publicly accessible and does not require any special permissions or access rights to obtain. In Ethical Hacking, OSINT is a valuable skill to master. Here's an in-depth explanation…

0 Comments
Ethical Hacking: A Quick Introduction
Man wearing Anonymous mask in a server room

Ethical Hacking: A Quick Introduction

What is Ethical Hacking? Ethical hacking, also known as penetration testing or white hat hacking, is the practice of intentionally probing computer systems, networks, and software applications to identify and address potential security vulnerabilities. Unlike malicious hackers, ethical hackers operate with permission and under a specific set of rules and guidelines to ensure they act within legal and ethical boundaries. The Objectives of Ethical Hacking The main objectives of ethical hacking are to assess the security posture of an organization,…

0 Comments
CryptoPunks Harvester Using Python
python Logo White

CryptoPunks Harvester Using Python

What are NFT's? NFTs, or Non-Fungible Tokens, are a type of digital asset that represents ownership or proof of authenticity of a unique item or piece of content using blockchain technology. Unlike cryptocurrencies such as Bitcoin or Ethereum, which are fungible and can be exchanged on a one-to-one basis (1 BTC is always equal to 1 BTC), NFTs are non-fungible, meaning each NFT has distinct characteristics that make it unique and irreplaceable. In this guide we are going to be…

0 Comments
Build a Crypto Tracker with Python
python Logo White

Build a Crypto Tracker with Python

What is Crypto? Cryptocurrency is a digital or virtual form of currency that has various use cases and applications. Here are some of the primary purposes and uses of crypto:Digital Payments: Cryptocurrency can be used as a medium of exchange for goods and services, similar to traditional currencies. Many online and even some physical merchants accept cryptocurrencies as a form of payment. Cryptocurrency transactions can be faster and cheaper than traditional banking methods, especially for international transactions.Investment: Some people buy…

0 Comments
Halloween Horror: Best Ever Classic Horror
halloween horror 2021

Halloween Horror: Best Ever Classic Horror

Halloween Horror 2021 As the leaves turn to fiery shades of red and orange and a chill settles in the air, Halloween approaches, and with it comes the perfect excuse to indulge in the spine-tingling, heart-pounding, and hair-raising world of horror cinema. In the spirit of the season, we're revisiting and listing our top 10 horror films of all time to give you some great Halloween horror ideas. While the years may have passed, the classics continue to haunt our…

0 Comments
I Started Learning Visual Python (vPython)
python Logo White

I Started Learning Visual Python (vPython)

What is Virtual Python? Visual Python, also known as vPython, is a library that allows you to create 3D visualizations and animations in Python. It's particularly useful for teaching and learning physics and computer programming because it provides an easy-to-use interface for creating interactive 3D graphics. Visual Python is based on the popular Python programming language and is designed to be user-friendly, making it accessible to both beginners and experienced programmers. Where to Begin Learn Python:If you have never used…

0 Comments
IR Module: Programming the IR Module with Arduino
Getting Started with Arduino Infrared Module

IR Module: Programming the IR Module with Arduino

What is the Infrared Module used for? The IR module and a remote control can be used with an Arduino to enable wireless communication and control of electronic devices. Infrared communications are widely used for remote control applications, like controlling TVs, air conditioners, and other appliances.Updated Information: This guide has been re-written because of the latest update to the IRremote.h library. The old code from version 2 of the library that I used for this guide in 2020 no longer…

0 Comments
DC Motors: Programming DC Motors with Arduino
Getting Started with Arduino DC Motors

DC Motors: Programming DC Motors with Arduino

What are DC Motors? Direct Current (DC) motors are commonly used in various applications, including robotics, automation, and electronics projects. When combined with an Arduino microcontroller, you can control the speed and direction of DC motors, making them an essential component for many projects. It's important you remember this, do not connect the DC Motor to your Arduino 5v pin, Your Arduino board will quickly die, it cannot power it, instead we need a separate power supply to power the…

0 Comments
Servos: Programming Servos with Arduino
Getting Started with Arduino Servos

Servos: Programming Servos with Arduino

What are Servos? Servos, short for "servomechanisms" or "servomotors," are devices that are widely used in robotics and automation to control the position or orientation of various components, such as robot arms, camera gimbals, and model aircraft control surfaces. They are essential for tasks that require precise control of angular or linear position. A servo motor consists of three main components: Motor: The motor provides the physical movement. It typically has a DC motor that rotates a shaft. Gearbox: A…

1 Comment
Joysticks: Programming Joysticks with Arduino
Getting Started with Arduino Joysticks

Joysticks: Programming Joysticks with Arduino

How to use Joysticks with your Arduino Projects Using joysticks with Arduino is a common way to add manual control to your Arduino projects. Joysticks are input devices that allow users to provide analog input in two dimensions (X and Y axes) or even more with additional buttons. They are often used in applications like robotics, gaming, remote control systems, and more. This guide will show you exactly how to get started programming joysticks with your Arduino.Components You'll Need: Arduino…

0 Comments
Arduino Map Function and How to Use it
arduino2

Arduino Map Function and How to Use it

What is Arduinos Map Function? Arduinos Map Function is a useful utility function that helps you remap or scale a value from one range to another. It's often used to convert an input value (e.g., from a sensor or user input) that falls within one range to an output value that falls within a different range. This is particularly handy when you need to adapt sensor readings to control actuators or display data on a screen with Arduino. Here's a…

0 Comments
Pull-Up and Pull-Down Resistors with Arduino
Getting Started with Arduino Pull ups

Pull-Up and Pull-Down Resistors with Arduino

What are Pull-up and Pull-down Resistors? In Arduino programming, INPUT_PULLUP and INPUT_PULLDOWN are two options you can use when configuring digital pins as input pins. These options help you enable built-in pull-up or pull-down resistors on the pins to ensure a stable logic level when the pins are not actively being driven high or low by external components. There is also another way to create pull-up and pull-down resistors.INPUT_PULLUP: When you configure a digital pin as INPUT_PULLUP, you are enabling…

1 Comment
Program Tactile Switches with Arduino
Getting Started with Arduino Buttons

Program Tactile Switches with Arduino

What is a Tactile Switch? Tactile switches, often referred to as "tac switches" or "tact switches," are commonly used in electronic circuits and can be programmed with an Arduino microcontroller to perform various tasks or trigger actions when the button is pressed. The tac switch, like any normal switch, can be used to complete a circuits connection. In the image below, when the button is pressed A and B are connected, D and C are connected, this is the correct…

0 Comments