hacking Archive

How to decode WPA/WEP keys using Penetrate Pro

The App Penetrate Pro is developed by Biogo Ferreria. It is an excellent App for decoding WEP/WPA WiFi Keys. The Latest Build of the penetrate pro supports the following features. Routers based on Thomson: Thomson, Infinitum, BBox, DMax, Orange, SpeedTouch, BigPond, O2Wireless, …

How to deploy the UML diagrams

Introduction Deployment diagrams are one of the two kinds of diagrams used in modeling the physical aspects of an object-oriented system. A deployment diagram shows the configuration of run time processing nodes and the components that live on them. We use deployment …

40 Hacking Tools to become a powerful hacker #part 2

Just Like we Discussed in the Part 1 of this post : https://codingsec.net/2016/08/40-free-best-tools-will-help-become-powerful-hacker/ Here are the Next 40 hacking Tools that will make your a powerful hacker   Packet Crafting To Exploit Firewall Weaknesses     Hping Earlier Hping was used as a …

How Chinese Hackers Make $500,000 per Day

Security experts from Chinese security firm Cheetah Mobile say that an Android trojan that appeared in the summer of 2014 has exploded in terms of activity, as they’re seeing millions of new smartphones infected with this threat every day. While in its …

Like the article? please consider sharing it. Thank you

Advertisment ad adsense adlogger