Enjoy Target Search Results

How To: Execute Remote Commands on a Disconnected Victim

Do you ever thought that you can't control an Internet disconnected system? I saw a funny video in Chema Alonso's youtube channel (A well-known hacker of my country and creator of Fingerprinting Organizations with Collected Archives among other security tools), and decided to post something similar.

How To: Hack TOR Hidden Services

A lot of people think that TOR services are unhackable because they are on a "secure environment", but the truth is that those services are exactly the same that run on any normal server, and can be hacked with the same tools (metasploit,hydra,sqlmap...), the only thing you have to do is launch a transparent proxy that pass all your packets through the TOR network to the hidden service.

How To: DIY Macramé Eternal Wave Bracelets

How to make Eternal Waves - Twisted Waves or Double Wave Bracelet. This Bracelet featuring oval shaped designs and wavy bars that crisscross. The bead clasp can be changed if you prefer to use a Sliding Clasp instead, or Clasp with Button. Hope you enjoyed the tutorial.