Search results

  1. Mutt

    SandCat Browser - a browser for finding vulnerabilities

    This browser includes a whole set of tools designed to in-depth study of various elements of the page and assess their impact on the security and performance of the site. Among the key features of Sandcat, support for Tor technology is also mentioned, which provides users with the ability to...
  2. Mutt

    cSploit

    For informational purposes only and does not call for action! cSploit is a network penetration analysis and testing tool. Quite an old pentest harvester for android, but still relevant. ps root rights are required to get full functionality! Possibilities: Normal sniffing Allows to redirect...
  3. Mutt

    Ideal kit for "Anonymity" in carding

    All information is for informational purposes only and does not call for action! Ideal kit for "Carder's Anonymity": Separate laptop. New 3G / 4G modem. New SIM card on the left forehead. VPN (traffic encryption). VPS (remote virtual server). New identified e-wallets for payment and for...
  4. Mutt

    A large selection of cool security tools

    Network security tools and penetration testing tools are most commonly used by security agencies to check for vulnerabilities in networks and applications. In this article, you can find a list of penetration testing tools that includes penetration testing in all environments. Scanners for...
  5. Mutt

    Predator - program for locking the computer using a USB-stick

    All information is provided for educational purposes only and does not call for action! Predator is a free program to lock your computer using a USB stick as a key. Predator allows you to lock your computer when you are away. It is enough to remove the key USB flash drive from the computer, and...
  6. Mutt

    5 books for the aspiring hacker and carder

    Today I have selected for you the top 5 books that every aspiring adventurer should read. "Hacker's laboratory" S.А. Babin Not a bad book on hacking techniques. The author communicates well the idea of understanding the knowledge gained. For beginners book fire! "Cyber Criminal # 1" Nick...
  7. Mutt

    Magicians, sorcerers and their methods of social engineering

    Social engineering 2021 In this article, we will raise the topic of social engineering (SE). After all, only with the help of SE knowledge and skills can you realize your technical skills and knowledge. If we attack the base, then we have a certain percentage of people who will click on the...
  8. Mutt

    5 plugins for privacy

    I decided to share useful plugins that I myself use in the browser. All of them are free and have good reviews about their work. The very meaning in such plugins may seem unimportant, and partly you may like it, but rather you are just used to it. By using these add-ons, you get certain...
  9. Mutt

    Hacking Wi-Fi with WPA / WPA2 Protection Kali Linux

    This article is for informational purposes only and does not call for action! Good day, today I will tell you about hacking a Wi-Fi network with WPA / WPA2 authentication. The kali linux distribution kit, which contains a large number of utilities, is perfect for conducting penetration testing...
  10. Mutt

    The best browsers for anonymous web surfing for Android and iOS

    In addition to the availability of information, confidentiality has become one of the most important values in recent years. Our data, and therefore ourselves, have become a commodity that is bought and sold without our demand. For many of us, this state of affairs does not cause discomfort...
  11. Mutt

    Where to start in hacking?

    More and more often I come across queries on the topic: Where to start in hacking? How do you become a hacker? How to hack a game / crypto exchange? Now I will try to answer this question for you. So where to start in "hacking" Get rid of the word "hacking" from your vocabulary. There is...
  12. Mutt

    Keeping anonymity online

    All information is provided for informational purposes only and does not call for action. Ways to stay anonymous online Proxy A proxy is a server that acts as an intermediary between a small local network and the Internet. Many internet users rely on proxies to hide IP addresses or access...
  13. Mutt

    What information can be found by IP?

    htmlweb.ru Allows you to define a country, sometimes a city and a region. Additionally, there is information from the whois server. At this point you can find information about the provider, as well as a contact phone number and mail for abuse. getipintel.net The service determines on a scale...
  14. Mutt

    Hacking any devices on the network

    This article was created for informational purposes only and does not call for action! We need: - Kali Linux - beef-xss framework - bettercap Install bettercap on Kali Linux: apt install build-essential ruby-dev libpcap-dev net-tools gem install bettercap Beef is already installed in Kali...
  15. Mutt

    Must Have Android apps

    Shark The same wireshark. Yes, it is also available for Android. Works flawlessly. The device started up without problems. Writes logs in * .pcap format. Adds to sdcard. The file can be easily parsed both on a windows machine and on the phone itself using Shark Read. DroidSheep / Facesniff...
  16. Mutt

    How to trick ISP and bypass DPI on Android

    DPI (Deep Packet Inspection) is a technology that allows you to collect statistical information from packets, check them and filter information, depending on the contents of the packet. Sometimes operators use this technology to filter entire protocols such as BitTorrent. There are two types of...
  17. Mutt

    ZARP is a tool for carrying out attacks on local networks

    Zarp is a network attack tool tailored for attacks on local networks. This is not just a set of exploits for specific vulnerabilities - the tool exploits architectural flaws in networks, protocols, and so on in its work. The program can work with several systems at the same time and do...
  18. Mutt

    How to Confuse Your ISP Through Termux

    Everyone has long known that providers keep logs and collect information about which sites we visit and when we do it. This program will make many requests per day to various sites from your IP, which can confuse the ISP who is watching you closely. Installation 1. Download the required...
  19. Mutt

    Copperhead OS - anonymous OS for carding via smartphones

    Copperhead OS Review The main feature of the Copperhead OS firmware is significantly advanced hacking prevention tools. Copperhead OS includes an improved implementation of the OpenBSD memory allocator (malloc), which randomizes the pages allocated to an application and fills the returned memory...
  20. Mutt

    40 shady carder rules

    Do not be lazy. If you have set for yourself the goal of making money by any means - go to it no matter what. Everyone wants to rest, relax, however, so that you can afford rest, you must first work fruitfully. Do not be greedy. You don't need to get hung up on money, you need to earn it calmly...
Top