Skip to content
Evotechspace
  • Home
  • Blog

How to Hack windows machine; Part 3

December 20, 2018

In the previous tutorials we have learnt how to gain access to a windows system. In this tutorial we can see what we can do with meterpreter session Type help to see all command We can use the screenshot command …

Read more

Categories Uncategorized Leave a comment

How to add a payload to a software program

December 20, 2018

In this tutorial we are going to see how we can add our payload to the executable files in windows. Tools needed Kali linux Shellter – this tool has proved most effective in creating AV evading payloads. The re-encoding capabilities …

Read more

Categories Social Engineering, Systems Hacking, Tutorials, Uncategorized Leave a comment

How to Hack windows machine; Part 2

December 19, 2018

In the previous tutorial we learnt how to use a payload pre-loaded in kali linux using msfvenom. In this part of the tutorial we shall see how to create a listener. Steps Open terminal and type msfconsole Type use exploit/multi/handler      …

Read more

Categories Systems Hacking, Tutorials, Uncategorized Leave a comment

How to crack WiFi Password

December 19, 2018

Hello friends in this tutorial we are going to learn how we to crack a WiFi password Note: for this tutorial we need wireless WiFi adapter with monitor mode Tools Kali Linux Wireless WiFi adapter with monitor mode Steps First …

Read more

Categories Network Pentesting, Tutorials Leave a comment

How to hack Android phones using metasploit

December 19, 2018

With the increase of mobile device users and the penetration of smartphones to the population, hackers have found a new playing field for exploiting victims. In this tutorial, we are going to see how easily a hacker can gain access …

Read more

Categories Android Penetration, Tutorials Leave a comment

How to Hack windows machine; Part 1

December 18, 2018

Note: This hack will work only if the Windows defender is turned off Tools used Kali Linux Msfvenom(For creating Payload) Msfconsole(For creating Listener) Steps For this part we need two thing; Payload – is nothing but the application that we …

Read more

Categories Systems Hacking, Tutorials Leave a comment

How to create key logger from scratch

December 6, 2018

Key logger; is a software that is used to record user input on the screen, normally keyboard input. Its usually used in secret by hackers to get useful information such as username, passwords, credit card information and screen captures. Ever …

Read more

Categories Python for Pentesters Leave a comment

Gmail Hacking using Phishing

December 6, 2018

Hello Friends, In this tutorial we are going to see how we can use a simple phishing tool to try and get a gmails’ username and password details from a victim. Tools Required Kali Linux ShellPhish Steps 1.Open the terminal …

Read more

Categories Social Engineering, Tutorials Leave a comment

How to Download Torrent Files with Internet Download Manager (IDM)

August 7, 2018

We all can agree downloading files via Torrent is much slower compared to IDM, or any other Download Manager. Most workspaces or institutions have torrent clients blocked on their network. Converting such files to Direct Downloads helps you such restrictions. …

Read more

Categories Hacks & Tricks Leave a comment

Top Kenyan Photographers to Follow in 2018

January 7, 2018

If you have an eye for good photographs and want your Timeline flooded with quality photos, below is a list of photographers you should follow in 2018

Categories Photography Tags Kenya, photographers, Photography Leave a comment
Older posts
Newer posts
← Previous Page1 Page2 Page3 Page4 Next →
Expect Better
Twitter Github