Loading…

Important Hacking Sources And Links

In this article I have compiled important Hacker sources and links. Of course, not everyone needs all of these sources and links. That’s why I’ve divided them up according to certain areas of application. If you are missing an important source, I would be happy if you could write it to me in the comments […]

Kaspersky Cyber Attack Map

I recently introduced the FireEye Cyber ​​Threat Map, which clearly illustrates all cyberattacks in real time. Another well-presented alternative is Kaspersky’s Cyber ​​Attack Map. Link to the Kaspersky Cyber ​​Attack Map Link to the Kaspersky Cyber ​​Attack Map  

Fireeye Cyber Threat Map

FireEye, Inc. is a publicly traded company based in Milpitas, California, USA that provides network security software and services. It gained notoriety among other things with the discovery of several zero-day gaps in Microsoft’s Internet Explorer and participation in investigations of and actions against several botnets. A free Fireeye service is the browser-based Fireeye Cyber […]

Eine Facebook Phishing-Seite erstellen

Create a Facebook phishing page

In this tutorial, I’ll show you how to create a Facebook phishing page to catch usernames and passwords that can hack other users’ Facebook accounts. But this knowledge should never be used to hack foreign Facebook accounts. It is simply not legal, in Germany it violates the Criminal Code StGB § 202c. Please also read […]

Google Dork Liste 2018

4500+ Google Dork List

In this article, I’ve put together a Google Dork list. Google Dorks are mostly used over the Internet to attack SQL injections, such as website hacking. However, before a SQL injection can be performed, a vulnerability must be found. Google Dorks are the little codes that can help you find the flaws in Google search […]