Lot's of peoples ask me that can we trace location by just using IP address of victim and how accurate location details we can trace from an IP…
Continue ReadingAs we all know the role of port forwarding is most important in field of ethical hacking and pen testing to deal with wide area network devices. S…
Continue ReadingWhenever i try connect an app to the heroku server my account get blocked after some time so i decided to find out new best alternative platform …
Continue ReadingHey guys we are back with another excited tutorial in which we are going to show you how you can install apktool - apk reverse engineering toolkit …
Continue ReadingHey guys we are come back with another tutorial in which we are going to show you how to to extract details from an phone number using PhoneInfoga T…
Continue ReadingHey guys we are come back with another excited blog post. We created many tools to modify apk payloads to make it undetectable, bind with other apk,…
Continue ReadingWe are back with another Metasploit tutorial in which we going to show you how to remotely change the victim device wallpaper using Metasploit-frame…
Continue ReadingHey guys we are come back with another excited ethical hacking post in which we going to show you what is Sql Injection and how hackers or attacker …
Continue ReadingHi guys today am going to show you how to install SqlMap in your Termux without root. Using SqlMap you can scan and exploit different type of websit…
Continue ReadingHey guy's we are come back with another excited tutorial in which we going to introduce you one of the best web application pentesting framework…
Continue ReadingHello and welcome back friends we are come back with another excited tutorial in which we going to introduce you with Rath-DDoS tool or script which…
Continue ReadingHello guys we are come back with another excited tool which helps you generate crash link for all Operating systems. So excited let's get starte…
Continue ReadingHey guys we are back with another excited post in which we describe Recon Cobra Framework which is used for Information Gathering. It is a most comp…
Continue ReadingHello and welcome back friends we are coming back with another exciting tutorial in which we learn how to use or download the Ngrok server in Termux …
Continue ReadingHi ! Guy's we are come back with another excited tutorial. Peoples who just start learning Linux or Termux and want to generate payloads with me…
Continue ReadingWe described lots for tools for information gathering or particular social account, phone, Ip, Email, etc. but today we are going to introduce you t…
Continue ReadingInformation gathering is the first stage of successful penetration testing. You must gather publicly available information about the target as much a…
Continue ReadingHello and welcome back viewers today I am going to introduce you to a script or tool which may help you see into someone's private Instagram acco…
Continue ReadingIf you guys really like Hacking and Cracking then obviously you also heard about Mr. Robot - Web Series if you don't know then check it out it…
Continue ReadingWhat is Cross-site Scripting (XSS) It is c client-side code injection. Vulnerability happens when a hacker input html script from url, post even …
Continue ReadingTech consumers look to Hackersking for the latest Ethical Hacking & Cyber Security guides, News, Technology tips & tricks.
admin@hackersking.com
Copyright (c) 2025 Hackersking All Rights Reserved