Menu
A subreddit dedicated to hacking and hacking culture.What we are about: quality and constructive discussion about the culture, profession and love of hacking.This sub is aimed at those with an understanding of hacking - please visit for posting beginner links and tutorials; any beginner questions should be directed there as they will result in a ban here.Guides and tutorials are welcome here as long as they are suitably complex and most importantly legal!Bans are handed out at moderator discretion.Another one got caught today, it's all over the papers. 'TeenagerArrested in Computer Crime Scandal', 'Hacker Arrested after Bank Tampering'.Damn kids. They're all alike.
Rules:.Keep it legalHacking can be a grey area but keep it above board. Discussion around the legality of issues is ok, encouraging or aiding illegal activities is not.We are not your personal army.
We have compiled a list of 15 best WiFi hacker for PC and Android. This list contains softwares and apps that can hack WPA/WEP wifi passwords. Some of them are network analyzer and decryptor, that helps in analyzing the data and generating a password. Software All Software latest This Just In Old School Emulation MS-DOS Games Historical Software Classic PC Games Software Library. Internet Arcade. Win3ZANTI Scanner Internet Archive Python library 0.9.1 Year 1993. Plus-circle Add Review. Reviews There are no reviews yet.
This is not the place to try to find hackers to do your dirty work and you will be banned for trying. This includes:. Asking someone to hack for you. Trying to hire hackers.
Asking for help with your DoS. Asking how to get into your 'girlfriend's' instagram.
Offering to do these things will also result in a ban.No 'how do i start hacking?' See or the stickied post.Intermediate questions are welcomed - e.g. 'How does HSTS prevent SSL stripping?' Is a good question. 'How do I hack wifi with Kali?' Is bad.No 'I got hacked' posts unless it's an interesting post-mortem of a unique attack. Your nan being phished doesn't count.Sharing of personal data is forbidden - no doxxing or IP dumping.Spam is strictly forbidden and will result in a ban.
Professional promotion e.g. From security firms/pen testing companies is allowed within the confines of site-wide rules on self promotion, but will otherwise be considered spam.Off-topic posts will be treated as spam.Low-effort content will be removed at moderator discretion.We are not tech support, these posts should be kept on.Don't be a dick. Play nice, support each other and encourage learning.Recommended Subreddits:. Hi -dSploit recently merged with zImperium to create zAnti. I've used it briefly out of curiosity, and would have to recommend it to anyone interested in security. As for PC equivalents, there are few things better than Kali Linux. It is a Debian-derived operating system that focuses on penetration testing and network security.
All of the tools that come bundled could be used independently on a more powerful machine, but having a little bit of everything in one place works well too. Putting an image on a flash drive as a portable toolkit is probably where you'll get the most use.Any other questions you have about tools or technique can be answered by the folks over atHope this helps, and happy hacking!.
Welcome!.Useful Links.Challenges. Boot2Roots and walkthroughs.
Interactive privilege escalation with browser-based bash shells (and much more). Damn Vulnerable Web Application. Learn-as-you-go web exploitation game made by a redditor. Web exploitation. Privilege escalation over SSH, web exploitation.
See upcoming events and writeups from past CTFs.Related Subreddits:,Security Advisories,Download LinuxThis Subreddit is not.We teach you how to do it, use it at your own risk.