Hack April 28, 2024 Access any cellphones Camera and more with Storm-Breaker Here’s a step-by-step guide for installing and using Storm-Breaker, a social engineering tool, on Kali… majorjoker 0 Love0
Info April 26, 2024 Enhance your online anonymity Here’s a step-by-step guide on how to enhance your online anonymity using Kali Linux and… majorjoker 0 Love0
Hack April 9, 2024 Unmasking the Meta Oculus: How Hackers Are Locking Facebook Users Out of Their Accounts (Part 2) Facebook needs to take swift action to address the security issues arising from the unauthorized… majorjoker 0 Love5
Hack April 9, 2024 Unmasking the Meta Oculus: How Hackers Are Locking Facebook Users Out of Their Accounts (Part 1) Introduction In recent weeks, an alarming trend has emerged in the digital landscape, affecting unsuspecting… majorjoker 0 Love4
Info December 14, 2023 Lockbit Ransomware: A Fighter’s Guide Defending Against the Notorious Crypto-Thief Lockbit Ransomware: A Fighter's Guide Defending Against the Notorious Crypto-Thief Lockbit, a notorious ransomware strain,… majorjoker 0 Love2
HackInfo September 25, 2023 OSINT – Open Source Intelligence Tools What is OSINT and how can you use it? OSINT, or open-source intelligence, is the… majorjoker 0 Love9
Info September 22, 2023 Becoming an ethical hacker: Resources to help you achieve your goal This is not a guide, it's just the basics to help you get started. Ethical… majorjoker 0 Love10
Hack August 23, 2023 Flipper Zero vs Hospitals Recently I spent a few days in a hospital with my mom whom had open… majorjoker 0 Love10
Hack June 7, 2023 Overview of vulnerability exploitation I use most of the tools listed below on a daily basis. Overview of vulnerability… majorjoker Love17
Work June 6, 2023 Tracking an ip down Thought I would share the start of tracking down a phishing scam (this was a… majorjoker Love18