Learn Social Engineering From Scratch
Learn how to hack accounts & personal devices (Windows, Mac OS X, Linux & Android) & how to secure yourself from hackers
What you’ll learn
- Hack updated & patched systems (Windows, Linux, OS X and Android).
- Generate undetectable backdoors for Windows, Mac OS X, Linux & Android.
- Generate malware to steal all passwords from Windows & Linux.
- Embed malware in Microsoft Office documents.
- Backdoor Android applications.
- Make evil files (backdoors / keyloggers) look and function like normal files (image, pdf or any other file type).
- Manually modify malware to bypass anti-virus programs.
- Advanced malware delivery techniques (through fake pages, fake emails, indirect notifications…etc)
- Advanced post exploitation.
- Discover websites, companies, people, emails and social networking accounts associated with a person or a company.
- Install hacking lab & needed software (on Windows, OS X and Linux)
- Install Kali Linux – a penetration testing operating system
- Install windows & vulnerable operating systems as virtual machines for testing
- Learn linux basics
- Learn linux commands and how to interact with the terminal
- Build attack strategies based on the gathered info
- Generate a remote keylogger that logs every key strike entered on a target computer and sends reports by email.
- Backdoor Debian packages for Linux
- Generate OS X backdoors that look and function like normal files (image, pdf …etc).
- Hack OS X and Linux computers by using a simple one line command.
- Send emails from ANY email account.
- Create fake websites that look exactly like any other website.
- Create a fake login page and use it to stead passwords.
- Use smart social engineering techniques to make the target person willingly use our fake website.
- Deliver malware as fake updates, fake installers …etc.
- Read, write download, upload and execute files on compromised systems.
- Capture key strikes on compromised systems.
- Use a compromised computer as a pivot to hack other computers on the same network.
- Maintain your access to the hacked systems even after restart.
- Escalate your privileges to admin.
- Analyse files & detect undetectable malware.
- Use a sandbox to analyse undetectable malware.
- Access messages, social accounts, camera, GPS …etc of hacked phone.
Download Link:
https://mega.nz/folder/xN4QFQ7K#vBQ4ibDkE3kk0c_1r68u-g/folder/MEA1UYAD