Thanks to Elon Musk’s efforts, you can drive a Tesla today without even knowing how to drive. And thanks to a developer who goes by the handle AhMyth (the same name he gave his tool), anyone can…
CONTINUE READING 🡒 Author: Ghoustchat
Battle smartphone. How to transform your Android device into ‘hackerphone’…
In sci-fi movies, hackers use cellphones to compromise heavily protected networks. Up until recently, it was just a fantasy, but now this fantasy becomes a reality. In this article, I will explain how to transform your phone into a powerful hacking tool.
CONTINUE READING 🡒 Python reverse shell. How to boost your networking capacity with…
In this article, I will show how Python scripts can be used to transmit messages between two computers connected to the web. You may need to perform such an operation while developing an app, pentesting a corporate…
CONTINUE READING 🡒 DDoS attacks on Bluetooth. How to disable annoying portable speakers
Gangs of teenagers with portable Bluetooth speakers playing loud music drive me nuts. Today, I will explain how to neutralize this 'natural disaster' without (OK, almost without) committing a criminal offense.
CONTINUE READING 🡒