Category Archives: Tutorial

03 Oct

THE CRYPTER BIBLE

Crypter Bible Everything you need to know. We explain features, options, settings, basic knowledge, detections, how to not ruin your stub and ultimately how not to annoy the crypter owner. Terms & Definitions RunPE RunPE is the piece of code made to Inject the Payload into the memory of the chosen process. Injection The process

Read More
01 Oct

BlueBorne

The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.

Read More
31 Dec

What are DDoS attacks? DDoS Explained

In this post we you will know more about DDoS and DDoS methods What is DDoS?   HTTP Flood Attacks   DNS Amplification Attacks   THC-SSL-DOS Attack Tool   Slowloris DDoS Attack Tool   R-U-Dead-Yet, RUDY DDoS Attack Tool   Optima Bot   Counterattacks: Changing the Dynamics of a Cyber attack

Read More
27 Nov

Hacking users on same WIFI [Android]

Network Spoofer lets you change websites on other people’s computers from an Android phone Features include: Flip pictures upside down Flip text upside down Make websites experience gravity Redirect websites to other pages Delete random words from websites Replace words on websites with others Change all pictures to Trollface Wobble all pictures / graphics around

Read More
27 Nov

Wifi Kill 2.2

  Well, with this app you can disable internet connection for a device on the same network. So if someone (anyone) is abusing the internet wasting precious bandwidth you could just kill their connection and stay happy with a full bandwidth just for yourself.

Read More