Important Hacking Sources And Links

In this article I have compiled important Hacker sources and links. Of course, not everyone needs all of these sources and links. That’s why I’ve divided them up according to certain areas of application. If you are missing an important source, I would be happy if you could write it to me in the comments […]

AirDrive Keylogger – Forensic Keylogger Cable

Some time ago I reported about the AirDrive keylogger. It has a Wi-Fi function and sets up its own network for this. Now AirDrive has released a new product, a keylogger in the form of a USB extension.   Overview Works as a WiFi hotspot, connectivity from any computer, smartphone or tablet Access to keystroke […]

USB Password Stealer Turorial

Every security system has a vulnerability and all security systems have the same vulnerability – Human. Most people simply tick “Remember Me” on the websites they visit, as this is convenient. This happens especially often on private computers, which are not used by others, but often also on service devices, to which a hacker has […]

Fireeye Cyber Threat Map

FireEye, Inc. is a publicly traded company based in Milpitas, California, USA that provides network security software and services. It gained notoriety among other things with the discovery of several zero-day gaps in Microsoft’s Internet Explorer and participation in investigations of and actions against several botnets. A free Fireeye service is the browser-based Fireeye Cyber […]

Hack Excel Passwords

In Excel you can protect tables with the so-called leaf protection with a password. In this tutorial, I’ll show you how to remove the password if you have forgotten it. The following tutorial may of course only be used for your own files, otherwise you would be liable to prosecution. Please note the disclaimer. Required […]

Hacking Like Mr Robot

Hacking like Mr. Robot Part 5 – Malware USB Sticks

USB sticks actually serve as storage media, but USB sticks can also be used as attack tools. The curiosity of what is probably for data on a found USB stick, entices many people to simply plug the USB stick into their computer. Once that happens, attackers have many options. In this tutorial, I’ll show you […]

Hacking Like Mr Robot

Hacking like Mr. Robot Part 4 – Social Engineering

You would not borrow your phone to a stranger in a hoodie? In one episode, Elliot asks Krista’s friend if he can use his cell phone to make a phone call. Then he calls himself and gets the phone number  of the victom and finally, access to many more private information. The exploitation of trust […]

Hacking Like Mr Robot

Hacking like Mr. Robot Part 3 – Cloning RFID Cards

To gain access to Sentinel, Darlene applies a well-known hardware hack and exploits her relationship with an FBI agent – Cloning RFID Cards Darlene invites FBI Agent Dom to the bar, where they first talked in person. Dom comes with all her usual FBI utensils, such as her badge, her gun, and the RFID card that […]

Eine Facebook Phishing-Seite erstellen

Create a Facebook phishing page

In this tutorial, I’ll show you how to create a Facebook phishing page to catch usernames and passwords that can hack other users’ Facebook accounts. But this knowledge should never be used to hack foreign Facebook accounts. It is simply not legal, in Germany it violates the Criminal Code StGB § 202c. Please also read […]

Google Dork Liste 2018

4500+ Google Dork List

In this article, I’ve put together a Google Dork list. Google Dorks are mostly used over the Internet to attack SQL injections, such as website hacking. However, before a SQL injection can be performed, a vulnerability must be found. Google Dorks are the little codes that can help you find the flaws in Google search […]