Connexion utilisateur
Hackers Reference v22
The Ultimate Hacking Reference!
This application details various different hacking methods, exploits, software attacks and more! If you ever wanted to know what a SQL injection is, what social engineering is, or simply already know most of the material and just want a handy reference, with How-To's, cheatsheets, quick references and more, THIS IS THE APP FOR YOU!
Our review from DroidTweak:
"The Best Hacking Reference Available! For Beginners and Experts alike! 5/5 Stars!"
***THIS APPLICATION IS FOR LEARNING/EDUCATIONAL PURPOSES ONLY. THE CREATORS OF THIS APP DO NOT CONDONE ILLLEGAL ACTIVITIES AND DO NOT SUPPORT ILLEGAL HACKING. THIS APP IS DESIGNED AS A REFERENCE FOR ETHICAL HACKERS AND PENETRATION TESTERS.***
-------
The Largest and Most Extensive Hacking Reference on the Market!
-------
Learn how to:
- Secure yourself and your devices from malicious attackers! -
- Properly install and configure anti-virus for your Windows PC -
- Configure and secure Firefox so as to remain impervious to online hackers and various web attacks! -
- Learn how to spot and remove malware from your system! -
- Learn how to secure your android device from malicious applications, hackers stealing your data, and eavesdroppers! -
- Encrypt and backup your android device! Learn how to prevent thieves from stealing your data with your device! -
- Use the very same guides used by the NSA, CIA, FBI, and DoD to secure their devices! Learn how to be as secure as the NSA! -
- Exploiting Wireless Networks:
--Cracking WEP Encryption
--Cracking WPA/2 Encryption
--Introduction to Sniffing the Wire
--Cracking WEP/WPA(2) through WPS
-Exploiting Web Applications:
--Cross-Site-Request-Forgery How-To
--SQL Injection How-To
--Unrestricted URL references
--Local/Remote File Injection
--Cross Site Scripting
--Webshells
--Various other attacks
-Exploiting your local Network
--Scanning the Network & Enumerating Services
--Exploiting Services
--Maintaining Access
--Linux Post-Exploitation Cheat Sheet
--OS X Post-Exploitation Cheat Sheet
--Windows Post-Exploitation Cheat Sheet
--ARP & DNS Poisoning
--Nmap command reference
--USB Device hacking
--Wireshark reference
- How to Create a Legal Hacking Lab for testing and training!
+MORE!
THIS APPLICATION PERFORMS NO HACKING. IT IS ONLY A TEXTUAL REFERENCE.