Hack Worm
8.19K subscribers
862 photos
43 videos
27 files
1.21K links
πŸ”° Learn Ethical Hacking From Scratch πŸ”°

βœ” Premium Hacking Video Tutorial
βœ” Premium Hacking Software
βœ” Black Hat Techniques & much more
Download Telegram
Hack Worm pinned Deleted message
πŸ”° Brute-Force Nearly Any Website Login with Hatch πŸ”°

The tactic of brute-forcing a login, i.e., trying many passwords very quickly until the correct one is discovered, can be easy for services like SSH or Telnet. For something like a website login page, we must identify different elements of the page first. Thanks to a Python tool for brute-forcing websites called Hatch, this process has been simplified to the point that even a beginner can try it.

Full Tutorial : https://www.hackworm.ml/2019/03/brute-force-nearly-any-website-login.html
πŸ”°Web Vulnerability ScannersπŸ”°

πŸ”ΊNetsparker Application Security Scanner β€” Application security scanner to automatically find security flaws.

πŸ”ΊNikto β€” Noisybut fast black box web server and web application vulnerability scanner.

πŸ”ΊArachni β€” Scriptableframework for evaluating the security of web applications.

πŸ”Ίw3af β€” Webapplication attack and audit framework.

πŸ”ΊWapiti β€” Blackbox web application vulnerability scanner with built-in fuzzer.

πŸ”ΊSecApps β€” In-browserweb application security testing suite.

πŸ”ΊWebReaver β€” Commercial,graphical web application vulnerability scanner designed for macOS.

πŸ”ΊWPScan β€” Blackbox WordPress vulnerability scanner.

πŸ”ΊZoom β€” Powerfulwordpress username enumerator with infinite scanning.

πŸ”Ίcms-explorer β€” Revealthe specific modules,plugins,components and themes that various websites powered by content management systems are running.

πŸ”Ίjoomscan β€” Joomlavulnerability scanner.

πŸ”ΊACSTIS β€” Automatedclient-side template injection (sandboxescape/bypass)detection for AngularJS.

πŸ”ΊSQLmate β€” Afriend of sqlmap that identifies sqli vulnerabilities based on a given dork and website (optional).

βž– @HackWormAdmin βž–
πŸ”° Bug Bounty Hunting πŸ”°

A bug bounty program is a deal offered by many websites and software developers by which individuals can receive recognition and compensation for reporting bugs,especially those pertaining to exploits and vulnerabilities.

Areward offered to a perform who identifies an error or vulnerability in a computer program or system.
 β€˜Thecompany boosts security by offering a bug bounty’

βž– @HackWormAdmin βž–
Hack Worm pinned Deleted message
πŸ”°Proxy TrojanπŸ”°

A proxy Trojan is a virus which hijacks and turns the host computer into a proxy server,part of a botnet,from which an attacker can stage anonymous activities and attacks. 

Thewhole point of a proxy Trojan is to hide the attacker,making it harder to trace the true origin of an attack since the attacks will look like they are coming from random and multiple directions because of the proxy bots.

βž–@HackWormAdmin βž–
πŸ”° Search Engine For Hackers πŸ”°

1. Censys.io
2. Shodan.io
3. Viz.Greynoise.io/table
4. Zoomeye.org
5. Fofa.so
6. Onyphe.io
7. App.binaryedge.io
8. Hunter.io
9. Wigle.net
10. Ghostproject.fr

βž– @HackWormAdmin βž–
Ⓜ️WAPITIⓂ️

πŸŒ€Wapiti is a free open-source command-line based vulnerability scanner written in Python. While it’s not the most popular tool in this field, it does a good job of finding security flaws in many web applications.πŸŒ€

βž–@HackWormAdminβž–
πŸ”° STUXNET Source Code πŸ”°

Stuxnet is a malicious computer worm, first uncovered in 2010. Thought to have been in development since at least 2005, Stuxnet targets SCADA systems and is believed to be responsible for causing substantial damage to Iran's nuclear program.

https://pastebin.com/BeJ6zT7D
πŸ”° Some Hacking Terminologies πŸ”°

β–ͺ Phishing
β–ͺ Malware
β–ͺ Ransomware
β–ͺ Spoofing
β–ͺ Encryption
β–ͺ Adware
β–ͺ Zero Day threat
β–ͺ Brute Force Attack
β–ͺ HTTPS/SSL/TLS
β–ͺ Bot
β–ͺ Botnets
β–ͺ Distributed Denial of Service Attack (DDOS)
β–ͺ Firewall
β–ͺ Payload
β–ͺ White hat
β–ͺ Rootkit
β–ͺ RAT
β–ͺ SPAM
β–ͺ Worm
β–ͺ Cloaking

βž– @HackWormAdmin βž–
πŸ”° Programming Language For Hacking πŸ”°

Since programming is essential for hacking because a hacker is someone who breaks a protocol or an application security which is programmed in a certain programming language and to hack an application a hacker needs to understand the logic of that app, find flaw and the exploit it. So a hacker must learn a couple of programming languages to complete his task. So checkout the important programming languages for hackers and where to apply it.
Programming languages for Web Hacking and Pentesting

If you’re interested in web hacking and pentesting, then you must learn learn below mentioned languages at-least basic and intermediate level.

1]HTML
2] JavaScript
3]SQL (most important)
4] PHP
5] perl
Programming Languages for writing Exploits

Exploit writing is advance part of Hacking, It requires higher level of programming language. Every professional hacker must know Exploit Writing, It can be done in any programming language like C, C++, Ruby, Python etc.

1]c/c++
2] python (most important)
3] ruby
4]java
5]LISP
Programming languages for Reverse Engineering

Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and reproducing it or reproducing anything based on the extracted information. Reverse engineering is also beneficial in crime prevention, where suspected malware is reverse engineered to understand what it does, and how to detect and remove it, and to allow computers and devices to work together. Reverse engineering can also be used to β€œcrack” software and media to remove their copy protection.

1] Assembly language

Finally one more thing, programming languages for hacking also depends upon what program you want to hack, for example; if a web-app in coded in ASP.NET then you can’t hack it using PHP knowledge, although you can understand logic but it will be harder, so always make sure what you wanna hack and in which programming the app is coded.
Hack Worm pinned Deleted message
πŸ”° Limited Time Period Offer πŸ”°

Build an Advanced Keylogger using C++ for Ethical Hacking!

Enroll Now For Free:
https://www.udemy.com/how-to-create-an-advanced-keylogger-from-scratch-for-windows/?couponCode=JERRYBANFIELD
πŸ”°Wifi Penetration CourseπŸ”°
WiFi Penetration Testing (Ethical Hacking) From Scratch

Enroll Now For Free : https://www.udemy.com/wifi-hacking-from-a-penetration-testers-perspective/?couponCode=FB_WIFI_HACK
Channel name was changed to Β«Hack WormΒ»
πŸ”° Hack Instagram Account πŸ”°

Instashell Script :
https://github.com/thelinuxchoice/instashell?files=1
#requested

πŸ”° ANDROID ETHICAL HACKING COURSE, C, C++, Python Programs πŸ”°

https://www.udemy.com/android-ethical-hacking-course-c-c-python-programs/
Installation and Using Lazymux

git clone https://github.com/Gameye98/Lazymux

cd Lazymux

python2 lazymux.py
πŸ”° Still worry about where to start from πŸ”°

Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques.

Here is the Career PathWay πŸ‘‡

βž– @HackWormAdmin βž–