PinnedSamxia99inSystem WeaknessThe Rise of Dark Web Marketplace (RaaS) Ransomware-as-a-Service:Ransomware-as-a-Service (RaaS) is revolutionizing cybercrime, making it easier for even low-level actors to launch ransomware attacks…Aug 21Aug 21
PinnedSamxia99inSystem WeaknessHow To Make Hacker-Like Interface In Computer!eDEX-UI is a fullscreen, cross-platform terminal emulator and system monitor that looks and feels like a sci-fi computer interface.Jul 12Jul 12
PinnedSamxia99inSystem WeaknessBest Hacking Methodologies for Penetration TestingHello everyone, I would like to share with you some of the best places for hacking methodologies available.Mar 15Mar 15
PinnedSamxia99Hack Social Media Accounts Using Zphisher Social Engineering Tool.Hello folks, I would like to introduce you to the ZPhisher toolkit which is a tool used to create fake phishing pages.Mar 191Mar 191
PinnedSamxia99Hunt Down Social Media Accounts by Usernames Using SherlockHello everyone, I would like to share with you how to use and download the osint tool Sherlock to hunt social media accounts.Mar 17Mar 17
Samxia99inSystem WeaknessSimple Bash Project For BeginnersSimple command-line to-do list application using Bash that allows users to add, view, and delete tasks for a project.Aug 17Aug 17
Samxia99inSystem WeaknessBlock CTF Walkthrough | THMEncryption? What encryption? easily solve this CTF!Aug 14Aug 14
Samxia99inSystem WeaknessWhat The Shell?: Part 2| TryHackMeAn introduction to sending and receiving (reverse/bind) shells when exploiting target machines. Part-2Aug 10Aug 10
Samxia99inSystem WeaknessWhat The Shell?: Part 1| TryHackMeAn introduction to sending and receiving (reverse/bind) shells when exploiting target machines.Aug 10Aug 10
Samxia99inSystem WeaknessAnthem CTF Walkthrough | THMexploit a Windows machine in this beginner-level challenge.Aug 71Aug 71