Hack Worm
8.19K subscribers
862 photos
43 videos
27 files
1.21K links
🔰 Learn Ethical Hacking From Scratch 🔰

Premium Hacking Video Tutorial
Premium Hacking Software
Black Hat Techniques & much more
Download Telegram
Media is too big
VIEW IN TELEGRAM
🔰 Router Vulnerability 🔰
Part 2
Media is too big
VIEW IN TELEGRAM
🔰 Router Vulnerability 🔰
Part 3
🔰 Social Engineering 🔰
Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. This differs from social engineering within the social sciences, which does not contain the divulging of confidential information.
Media is too big
VIEW IN TELEGRAM
Introduction to Social Engineering
Website Cloning Using SEToolkit.mkv
40.9 MB
Website Cloning Using SEToolkit
Media is too big
VIEW IN TELEGRAM
Social Engineering Demonstrate
[@HackWorm] Social Engineering.pdf
15.6 MB
🔰 Kali Linux Social Engineering 🔰
Media is too big
VIEW IN TELEGRAM
🔰 Introduction to SQL Injections 🔰
Part 1 SQL Injection
🔰 WHAT IS SQL INJECTION 🔰
SQL injection, also known as SQLI, is a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed. This information may include any number of items, including sensitive company data, user lists or private customer details.
🔎 SQL MAP🔍

SQL MAP Is A Advance Tool For Sql Injection And To Find Vulnerability Of Sites To Get The DB And Many UseFull Information

@HackWorm
sqlmapproject @HackWorm.zip
7.4 MB
🔰 SQL MAP Script 🔰
Media is too big
VIEW IN TELEGRAM
MySQL Database Setup
Part 2 SQL injection
Media is too big
VIEW IN TELEGRAM
BurpSuit Basic
🔰 Knowledge 🔰
Bypass 2-factor authentication
evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to bypass 2-factor authentication protection.
Hack Worm pinned Deleted message
🔰 Setoolkit 🔰
The Social Engineering Toolkit also includes a website tool that turns your Kali box into a webserver with a bunch of exploits that can compromise almost any browser. The idea is that we would send our target a link which routes them through to our website which automatically downloads and executes the exploit on the target system. You can even clone a valid website so the target is less suspicious. This becomes even more effective if you study your victims browser habits and clone one of their most frequently accessed sites.
🔰 Trity 🔰
Trity is an advanced pentesting framework dedicated to everything from vulnerability testing to cryptography.

Script : https://github.com/samyoyo/Trity-1

@HackWormAdmin
😈 theHarvester 😈
is a very simple, yet effective tool designed to be used in the early
stages of a penetration test. Use it for open source intelligence gathering and
helping to determine a company's external threat landscape on the internet. The
tool gathers emails, names, subdomains, IPs, and URLs using multiple public data
sources that include: all web pages

Command : root@kali:~# theharvester


@HackWormAdmin
🔰ARP Poisoning🔰

🌀ARP is the acronym for Address Resolution Protocol. It is used to convert IP address to physical addresses [MAC address] on a switch.  The host sends an ARP broadcast on the network, and the recipient computer responds with its physical address [MAC Address].  The resolved IP/MAC address is then used to communicate. ARP poisoning is sending fake MAC addresses to the switch so that it can associate the fake MAC addresses with the IP address of a genuine computer on a network and hijack the traffic.🌀

@HackWormAdmin
Hack Worm pinned Deleted message