Hack Worm
8.19K subscribers
862 photos
43 videos
27 files
1.21K links
πŸ”° Learn Ethical Hacking From Scratch πŸ”°

βœ” Premium Hacking Video Tutorial
βœ” Premium Hacking Software
βœ” Black Hat Techniques & much more
Download Telegram
#requested

πŸ”° ANDROID ETHICAL HACKING COURSE, C, C++, Python Programs πŸ”°

https://www.udemy.com/android-ethical-hacking-course-c-c-python-programs/
Installation and Using Lazymux

git clone https://github.com/Gameye98/Lazymux

cd Lazymux

python2 lazymux.py
πŸ”° Still worry about where to start from πŸ”°

Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques.

Here is the Career PathWay πŸ‘‡

βž– @HackWormAdmin βž–
πŸ”° Career PathWay πŸ”°

πŸ–‹ Introduction to Cyber Security

πŸ–‹ Basics of Networking and Web Technologies

πŸ–‹ Information Gathering and Footprinting

πŸ–‹ Operating System Hacking and Security

πŸ–‹ Malware Illustrations

πŸ–‹ Web Architecture and PHP Basics

πŸ–‹ Email Attacks and Security

πŸ–‹ Web Vulnerability Assessment and Penetration Testing

πŸ–‹ Introduction to Kali Linux and its Tools

πŸ–‹ Network Vulnerability Assessment

πŸ–‹ WiFi Hacking and Security

πŸ–‹ Cyber Forensics and Investigations

πŸ–‹ Smartphone Attacks and Security

πŸ–‹ Google Hacking Database

πŸ–‹ Basics of Reverse Engineering

πŸ–‹ Introduction to Complaince Management

*For Beginners Only

βž– @HackWormAdminβž–
Ⓜ️ ACUNETIX Ⓜ️

πŸŒ€Acunetix is a fully automated ethical hacking solution that mimics a hacker to keep one step ahead of malicious intruders. The web application security scanner accurately scans HTML5, JavaScript and Single-page applications. It can audit complex, authenticated webapps and issues compliance and management reports on a wide range of web and network vulnerabilities.πŸŒ€

βž–@HackWormAdminβž–
πŸ”° Non-targeted website hack πŸ”°

In most cases, hackers don’t target a specific website. They are more interested in massive hacking.
It is easy to suffer from a non-targeted attack – you just need to overlook any CMS, plugin or template vulnerability. Any gap is a chance to get into the hacker’s sight and become a victim during the next attack.

βž– @HackWormAdmin βž–
✳️ The Egg Shell tool for controlling the Mac and OS

https://github.com/neoneggplant/EggShell

βž– @HackWormAdmin βž–
πŸ”° Port Scan Attack πŸ”°

This is a technique often used to find weaknesses on a given server. It is normally used by those who are responsible for security to find vulnerabilities in the system. Port Scan Attack is used to send a message to a port and wait for a response and the received data from the open port is an invitation for hackers to hack into your server.

βž– @HackWormAdmin βž–
Ⓜ️ FIREBUG Ⓜ️

πŸŒ€ Firebug is a free and open-source web browser extension that currently works on Firefox and Chrome. Although not stictly speaking a β€˜hackers tool’, Firebug helps the penetration tester understand how certain technologies and systems works and therefore he or she is able to find holes that might be able to be exploited. πŸŒ€

βž–@HackWormAdminβž–
πŸ”° Penetration Testing & Ethical Hacking πŸ”°

Enroll Now : https://www.cybrary.it/course/ethical-hacking/

*Free For Only Limited Candidate.

**Complete Your Course and Get a certificate from Best Ethical Hacking Course Website : Cybrary.it
πŸ”° AutoScan-Network πŸ”°

βž– Information Gathering Tool

AutoScan-Network is an application designed to explore and to manage your network. Entire subnets can be scanned simultaneously without human intervention. It features OS detection, automatic network discovery, VNC Client, Ssh client.

βž– @HackWormAdmin βž–
Media is too big
VIEW IN TELEGRAM
How to Install & Configure Free VPN in Kali
πŸ”° Types Of Operators In Dorks πŸ”°

inurl:
Searches for a single word or phrase in the
URL of the search result.

site:
The results come from a specified site.

intitle:
Searches for the single word or phase in the title of the search result.

intext:
This Dork is used to search for pages & websites that contain the specific word that you are searching for.

Filetype:
This searches a specific file type.

cache:
This is used to lookup for cached pages by Google.

You can simply join more than one dork to make results even better.

βž– @HackWormAdmin βž–
πŸ”° How Hackers Create Malware and Infiltrate Victim Machines πŸ”°

Enroll Now:
https://www.udemy.com/how-hackers-create-malware-and-infiltrate-victim-machines/?couponCode=FREEBIES
Learn Hacking Using Android From Scratch

πŸ”—Link : https://drive.google.com/open?id=1tRtkESbHhj6nHcJok3HJ2osWfREzoIns
πŸ”° How to do email bombing or bomber by Termux πŸ”°

1. apt install python2
2. ls
3. git clone https://github.com/zanyarjamal/Email-bomber.git
3. cd Email-bomber
4. ls
5. chmod +x E-bomber.py
6. python2 E-bomber.py
7. select gmail/email which you want to hack
8. type victim email
9. select number of message
10. send = enter

βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–

❀️Enjoy and support us❀️

βž–β–«οΈ @HackWormAdmin β–«οΈβž–
Ⓜ️ w3af Ⓜ️

πŸŒ€ If you are looking for a free and open source web application security scanner, then w3af is the best one for you. The tool is widely used by hackers and security researchers. w3aF or web application attack and audit framework are used to get security vulnerability information that can be further used in penetration testing engagements. πŸŒ€

βž– @HackWormAdmin βž–
Ⓜ️ Cain and Abel Ⓜ️

πŸŒ€Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kinds of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force, and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols.πŸŒ€

βž–@HackWormAdminβž–
Ⓜ️JOHN THE RIPPERⓂ️

πŸŒ€John the Ripper is free and Open Source software, distributed primarily in source code form. It is the password cracking software tool. It is one of the most popular password testings and breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker.πŸŒ€

βž–@HackWormAdminβž–