Haxf4rall
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
  • Home
  • 2015
  • April

Month: April 2015

How to protect yourself against Phishing

- Hacking Tutorials, Phishing, Tricks & How To's
April 27, 2015July 27, 2019

Phishing is the method of stealing login info(usernames and passwords) by directing the victim to a clone(fake) login page, that…

Reverse Skype Resolver (How-to)

Reverse Skype Resolver (How-to)

- Information Gathering, OSINT, Tricks & How To's
April 26, 2015July 27, 2019

A Resolver will “lookup” a username on a VPS hosting the hacked skype, which allows the skype to pull data…

Cyborg Hawk Linux is ready to take on Kali ?

Cyborg Hawk Linux is ready to take on Kali ?

- Operating Systems
April 23, 2015November 18, 2017

Today I will be reviewing Cyborg Hawk Linux, the distro is based on Ubuntu and designed to be a penetration testing platform

How to create a keylogger in notepad

- Secure Coding, Tricks & How To's
April 22, 2015November 18, 2017

Here is a basic keylogger script for beginners to understand the basics of how keylogging works in notepad. This script…

How to find out if you’ve been HACKED with CMD

- Tricks & How To's
April 20, 2015November 18, 2017

There are numerous methods to see if you have been hacked. Using the Command Prompt, you can run a command…

TOP 100 Unique sites

TOP 100 Unique sites

- News, Tricks & How To's
April 19, 2015November 18, 2017

These sites solve at least one problem really well and they all have simple web addresses(URLs) that you can easily…

How to Check If A Used iPhone Is Stolen

- IOS Hacking, Tricks & How To's
April 19, 2015November 18, 2017

Apple attempted to address this issue with the Find My iPhone service in 2010, but that could be defeated by…

Reveal Asterix Symbols with Javascript

Reveal Asterix Symbols with Javascript

- Secure Coding, Tricks & How To's
April 18, 2015November 18, 2017

How to do it 1) Open the Login Page of any website. E.g http://www.gmail.com 2) Type your ‘Username’ and ‘Password’….

Complete Guide to Anti-Forensics – Leave no trace

Complete Guide to Anti-Forensics – Leave no trace

- Computer Forensics, Hacking Tutorials, Tricks & How To's
April 13, 2015November 18, 2017

The average personal computer is a security nightmare ,but what if i were to tell you there was a way…

A guide to obtain full anonymity for RAT users

A guide to obtain full anonymity for RAT users

- Hacking Tutorials, Remote Administration Tools, Tricks & How To's
April 6, 2015November 18, 2017

This theme is not so much about the use of the RAT, but rather about the safety and anonymity for…

Posts navigation

Older posts
hacker gadgets
hacker phone covers

Recent Posts

PlutoCrypt Ransomware Decryptor

PlutoCrypt Ransomware Decryptor

May 27, 2023
Galaxy Fold 4

Samsung to improve the durability of the waterdrop hinges in the foldable smartphones

May 26, 2023
CISA Adds CVE-2023-2868 Vulnerability to KEV Catalog

CISA Adds CVE-2023-2868 Vulnerability to KEV Catalog

May 26, 2023
Google releases Chrome version 111 to fix 40 security vulnerabilities

Google releases Chrome version 111 to fix 40 security vulnerabilities

May 26, 2023
PoC Exploit Released for GitLab CVE-2023-2825 Vulnerability

PoC Exploit Released for GitLab CVE-2023-2825 Vulnerability

May 26, 2023
CVE View

Mondoo v7.17.1 releases: Cloud-Native Security & Vulnerability Risk Management

February 16, 2023

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs

About Us

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Active Members

Submit a Tool

Hackers Handbook 2018


Grab your copy here

About Us

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Categories

  • Secure Coding
  • Documentary
  • Courses & Ebooks
  • Hack Tools
  • Hacking Tutorials
  • Mobile Hacking
  • News
  • Operating Systems
  • TOR
  • Tricks & How To’s

Active Members

Useful Links

Contact Us

Disclaimer

Privacy Policy

Submit a Tool

Copyright 2019. All rights reserved | Theme: OMag by LilyTurf Themes