Video steganography: recent advances and challenges
Hackerschoice(darkdontane) |
Video steganography approach enables hiding chunks of secret information inside video sequences. The features of video sequences including high capacity as well as complex structure make them more preferable for choosing as cover media over other media such as image, text, or audio. Video steganography...
NodeMCU ESP8266
Hackerschoice(darkdontane) |

NodeMCU ESP8266NodeMCU ESP8266 Development Kit is based on ESP-12E wifi module. It includes an onboard FTDI serial programmer, and a 3.3V regulator to power the ESP-12E module.It is a sort of plug-and-play module. Just plug-in a USB cable, program the wifi module,...
Open Source Rats
Hackerschoice(darkdontane) |

A remote access trojan (RAT, sometimes called creepware) is a type of malware that controls a system through a remote network connection. While desktop sharing and remote administration have many legal uses, “RAT” connotes criminal or malicious activity. A RAT is typically installed without the victim’s...
Hacking Android phone remotely using Metasploit
Hackerschoice(darkdontane) |

Step by step TutorialGenerating a Payload with msfvenomAt first, fire up the Kali Linux so that we may generate an apk file as a malicious payload. We need to check our local IP that turns out to be ‘192.168.0.112’. You can also hack an Android device through Internet by using your Public/External...
Write an XSS Cookie Stealer in JavaScript to Steal Passwords
Hackerschoice(darkdontane) |

Write an XSS Cookie Stealer in JavaScript to Steal PasswordsJavaScript is one of the most common languages used on the web. It can automate and animate website components, manage website content, and carry out many other useful functions from within a webpage. The scripting language also has many functions...
Dumping Database From Login Form
Hackerschoice(darkdontane) |
Well the Trick is already discussed in earlier tutorials knowledge of those injections deeply is just enough to collect data from Login form. But just for a purpose of Tutorial and to open your mind towards this exploitation we are here discussing how to collect data from Login Form.First of all...
Wireless Network Adapter Supports Monitor Mode & Packet Injection
Hackerschoice(darkdontane) |

Wireless Network Adapter Supports Monitor Mode & Packet InjectionAtheros AR9271: The Alfa AWUS036NHA is my favorite long-range network adapter and the standard by which I judge other long-range adapters. It's stable, fast, and a well-supported b/g/n wireless network adapter. There's...
How to Fix Bootloop Issue on Android
Hackerschoice(darkdontane) |

How to Fix Bootloop Issue on AndroidWe’ve recently acquired one of the Nexus 6P phones that “died”, ended up in bootloop, and we decided to restore it. Bootloop issue is usually attributed to some hardware (dead cores, connector issues, etc) or software issue (e.g. corrupt files), causing the...
Cain and Abel: Well-Known Password Recovery Tool
Hackerschoice(darkdontane) |

Cain and Abel: Well-Known Password Recovery ToolCain and Abel is very powerful and well-known tool for the password cracking and password recovery. According to official website, it is used over Windows operating systems. It allows its users to recover the passwords of various types by sniffing,...
Framework For Wireless Pentesting – SniffAir
Hackerschoice(darkdontane) |

Framework For Wireless Pentesting – SniffAirIntroductionSniffAir is an open-source wireless security framework which allows you to collect, manage and analyze wireless traffic. It also provides the ability to perform sophisticated wireless attacks. SniffAir takes care of the hassle associated...
Ehtools: Entynet Hacker Tools
Hackerschoice(darkdontane) |

Ehtools: Entynet Hacker ToolsWith the popularity and number of Wi-Fi tools increasing among beginners, Ehtools is a framework which allows the user to easily access these tools from a single platform. The simple but powerful tool can be used for a wide range of functions from installing new add-ons...