Blackhat Python: The Social Engineering App
Ethical Hacking-Blackhat Python

Blackhat Python: The Social Engineering App

The Social Engineering App In this Blackhat Python guide I will be talking about "The Social Engineering App". It's a password list generator used for dictionary attacks. I will explain in brief about password lists and dictionary attacks, but you can read my in-depth guide on these subjects here: Dictionary Attacks.Passwords Lists A password list, often referred to as a "password dictionary" or simply a "dictionary," is a collection of words, phrases, or character combinations. Password lists are used for…

0 Comments
Blackhat Python: The IP Stalker
Ethical Hacking-Blackhat Python

Blackhat Python: The IP Stalker

Quickly see if Your Targets are Online with The IP Stalker In this Blackhat Python project I have utilized the power of the ping command to monitor and quickly check if certain target systems are online. I then used TKinter to give the script a nice-looking and interactive GUI. This is my second and final version of this project as I feel it doesn't need any more time spent on it, it does what it is supposed to and looks…

0 Comments
Arduino Hacking Tools: Duckduino
Ethical Hacking - Arduino Logo

Arduino Hacking Tools: Duckduino

How to Build Your own Rubber Ducky with Arduino In this Arduino Hacking Tools guide, we will learn how to create your own "Rubber Ducky" style tool with Arduino. Thanks to the great Duckduino project created by Seytonic and Spacehuhn we can have the power of a "Rubber Ducky" for a fraction of the cost.What is the Rubber Ducky? The USB Rubber Ducky is a product created and sold by Hak5, a company specializing in network penetration testing equipment. It's…

0 Comments
The Evil Limiter: Analyze and Limit Bandwidth
Man wearing Anonymous mask in a server room

The Evil Limiter: Analyze and Limit Bandwidth

What is the Evil Limiter? The Evil Limiter is a powerful network tool created by bitbrute. It can slowdown any or all device's on a network. Maybe you want to limit your kids access to the internet after a certain time, this tool will certainly do that. Or maybe you want to wind up your spouse or siblings, this tool can certainly do that. This is an ethical hacking guide about the Evil Limiter. This guide is for educational purposes…

0 Comments
Shodan: A Guide to The Hackers Google
shodan

Shodan: A Guide to The Hackers Google

A Guide to Using Shodan This is an ethical hacking guide about Shodan, what it is and how to use it. This guide is intended for educational purposes only and shouldn't be used for any type of criminal activity whatsoever. Stay on the right side of the law guys.What is Shodan? Shodan is a search engine specifically designed to help users find and access internet-connected devices and services. Unlike traditional search engines like Google, which primarily index websites and web…

0 Comments