Quantcast
Channel: Hackers Online Club (HOC)
Browsing all 855 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How To Securing Health Data In a BYOD World

Securing Health Data In a BYOD World.This white paper will provide pragmatic insights on: Identifying risks, Developing and implementing policies, Focusing on information instead of devices, Securing...

View Article


Image may be NSFW.
Clik here to view.

Facebook Will Tell You If Any Government Is Spying On Your Account

Facebook Will Tell You If Any Government Is Spying On Your Account.Facebook CSO Alex Stamos said in statementThe security of people's accounts is paramount at Facebook, which is why we constantly...

View Article


Image may be NSFW.
Clik here to view.

CIA Director Email Account Gets Hacked By 19 Year Old Student

CIA Director Email Account Gets Hacked By 19 Years Old Student.Teen, who claimed that he hacked CIA Director "John Brennan" AOL Email account. “We are aware of the reports that have surfaced on social...

View Article

Image may be NSFW.
Clik here to view.

How To Boost Your Wi-Fi Signal With Beer Can

How To Boost Your Wi-Fi Signal With Beer Can?Have you ever think that your Beer Can boost your Wi-Fi Signal.Here is the Steps:Take Beer canWash out to clean the CanCut the Can Bottom around.Now repeat...

View Article

Image may be NSFW.
Clik here to view.

LiME Linux Memory Extractor

LiME ~ Linux Memory ExtractorA Loadable Kernel Module (LKM) which allows for volatile memory acquisition from Linux and Linux-based devices, such as Android.This makes LiME unique as it is the first...

View Article


Image may be NSFW.
Clik here to view.

Wikileaks Released CIA Head Email Accounts Details

Wikileaks Released CIA Head Email Accounts DetailsYesterday Wikileaks Tweeted about to publish the Email account details.ANNOUNCE: We have obtained the contents of CIA Chief John Brennan's email...

View Article

Image may be NSFW.
Clik here to view.

Mobile Security: How to Secure, Privatize, and Recover Your Devices (A $26.99...

Mobile Security: How to Secure, Privatize, and Recover Your Devices (A $26.99 Value!) Free eBook for a limited timeLearn how to keep your data secure when you’re on the go.Mobile phones and tablets...

View Article

Image may be NSFW.
Clik here to view.

Lets Encrypt Offers Free SSL Certificates To All Websites

Lets Encrypt Offers Free SSL Certificates To All Websites.Lets Encrypt Your Website with Free HTTPS Certificate.Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol...

View Article


Image may be NSFW.
Clik here to view.

UnEncrypted 4 Million TalkTalk Customers Data Got Hacked

UnEncrypted 4 Million TalkTalk Customers Data Got HackedUK Based Company TalkTalk Got Hacked .. 4 Million Customers Data have been breached. Company said that data was not encrypted. Its easy to open...

View Article


Image may be NSFW.
Clik here to view.

Sniffly To Sniffing Browser History Using HSTS And CSP

Sniffly Trick For Browser Fingerprinting. Sniffing browser history using HSTS + CSP.Sniffly is an attack that abuses HTTP Strict Transport Security and Content Security Policy to allow arbitrary...

View Article

Image may be NSFW.
Clik here to view.

Predicting Malicious Behavior: Tools and Techniques for Ensuring Global...

"Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security (A $54.99 Value) FREE for a Short Time!"A groundbreaking exploration of how to identify and fight security threats at...

View Article

Image may be NSFW.
Clik here to view.

WhatsApp Bot Seed: A Small Python Framework To Create A WhatsApp Bot Like A...

A small python framework to create a whatsapp bot, with regex-callback message routing (just like a web framework).What it does?Basic message handling:ExampleAutomatic media (images and videos)...

View Article

Image may be NSFW.
Clik here to view.

13 Million Users Data Breached Of Free Web Hosting Company 000Webhost

13 Million Users Data Leaked With Plain Text Password Of Free Web Hosting Company 000Webhost.000webhost is providing a free web hosting service for PHP and MySQL. The leaked data includes users names...

View Article


Image may be NSFW.
Clik here to view.

TOR Released Beta Messenger A Cross-Platform Chat Program Based On Instantbird

TOR Released Beta Messenger A Cross-platform Chat Program Based On Instantbird.Tor Messenger is a cross-platform chat program that aims to be secure by default and sends all of its traffic over Tor. It...

View Article

Image may be NSFW.
Clik here to view.

Police Arrested Second Teenager Over TalkTalk Hack

Second Teenager Arrested Over TalkTalk Hack.Last week 4 Million Customers of UK based company TalkTalk Data have been breached.According to Press Release from Metropolitan Police,Police have arrested a...

View Article


Image may be NSFW.
Clik here to view.

KeeFarce: Extract Passwords From KeePass 2.x Database Directly From Memory

KeeFarce: Extract Passwords From KeePass 2.x Database, Directly From memory.KeeFarce allows for the extraction of KeePass 2.x password database information from memory. The cleartext information,...

View Article

Image may be NSFW.
Clik here to view.

Tutorial: XSSF In Metasploit

  Tutorial: XSSF In MetasploitHey today I am back with some Metasploit stuff. Here is the XSSF (Cross Site Scripting Framework), which is used to analyse the XSS flaws in site. So here is the...

View Article


Image may be NSFW.
Clik here to view.

Akamai Reflective DDoS Tool

Akamai Reflective DDoS ToolAttack the origin host behind the Akamai Edge hosts and bypass the DDoS protection offered by Akamai services.How it works ?Based off the research done at NCC:Akamai boast...

View Article

Image may be NSFW.
Clik here to view.

Volatility Framework Plugin For Extracting BitLocker FVEK (Full Volume...

Volatility Framework Plugin For Extracting BitLocker FVEK (Full Volume Encryption Key)Volatility plugin: BitlockerThis plugin finds and extracts BitLocker Full Volume Encryption Key (FVEK) which can be...

View Article

Image may be NSFW.
Clik here to view.

How To Detecting DDoS Attack?

How To Detecting DDoS Attack?It's very important to have a single pane of glass where you can visualize all of the elements to help diagnose issues and detect DDoS attacks.Bob Pierpoint, Director of...

View Article
Browsing all 855 articles
Browse latest View live