Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Chapter 1:Remote Access – Using Metaploit and planting backdoors.
What is remote hacking? Gain full control on computer using Cobalt Strike Using Backtrack/Kali to gain full access to Machinne. Using Backtrack/Kali to Activate VNC on Victim Machine Conclusion
Chapter 2: Website Penetration - Finding vulnerability and hack it.
Retrieve Website Database with Sequel Injection
First we have to understand how SQL injection works Going on the mission for retrieving database from a vulnerable site.
Cross Site Scripting
Non persistent. The persistent
XSS to extract cookie session from users. Or even administrators Social Engeniring Facebook with the phishing Techinique
What is phishing 1.Creating Phishing.php file:
Some useful Chrome Extension Conclusion
Chapter 3: Denial of Service-Flooding Things.
What is Denial of Service (Flooding)? DDos Using notepad and command prompt. Peforming DdoS using LOIC DdoS a IPV6 router using Kali Conclusion
Chapter 4: Wireless Cracking-finding WPA/WPA2 authentication
Cracking Wi-fi password using Reaver Hack Wireless password using Cain & Abel By-passing the mac address filter within a wireless-router Even though we know the password we used, is right, this type of network won’t allow us to connect (Because currently our mac address is not registered). It will be like an endless loop without authentication. Conclusion
Chapter 5: Android Weaponize the Android and Infiltrate the Android
Weaponizing ur Android
Turn your Android device into a pentesting tool
Catching Wifi password in the Android Device. Using Metasploit to hack in the Android Root Folder. Conclusion
Chapter 6: Lan Attack- Compromising networks
Using nmap to hack machines in the network. Raspberry Pi in the office. Conclusion
Chapter 7. Staying Anonymous: Using the right VPN's
Using Cyberhost to disappear for good Using the tor browser Using ZenMate Setting the VPN for Kali to say cloaked Conclusion
Shodan the evil engine
What exactly is shodan? Hacking an IP Camera using Shodan. Conclusion
Build malicious applications with python.
Create Your own keylogger to monitor Victim Typings Building a Portscanner Building a zip Password cracker in Python Take screen shot
Ready made Virus with C++
C++ Environmental Setup Creating ur first C++ Application Basic understanding of C++ code
Declaring Variables in C++ Changing and Comparing Variables If Statement Syntax Loops C++ virus to render pc unbootable C++ virus crazy mouse and beeping. C++ block all inputs
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion