RuCore.NET – English Version

Posts

How to bypass Windows security

It was once thought that Windows Local Security was like a wrought iron gate with a tricky lock standing in the middle of a blank field: it looked formidable, but its effectiveness was questionable. Times change, and the winds’ security…

Selection of sites for open source search

Selection for Russia http://services.fms.gov.ru/info-service.htm?sid=2000 – check the validity of a passport of a citizen of the Russian Federation, you can also get information about the presence/absence of registration on the territory of the Russian Federation. https://service.nalog.ru/inn.do – service for determination…

How to properly set up Tor

Tor is an indispensable tool for those who are concerned about privacy when surfing the web. Many believe that to be completely anonymous, simply download the Tor browser package from the Internet and run it. This is not the case….

Hidden features Smartphone

For example, with the help of a simple code you can find out whether your phone is tapped or not, find out the IMEI of your smartphone, completely delete all files, etc. And all this can be done in 10…

Hacking WhatsApp

The process itself, like any hacking process, takes a lot of effort, patience and certain knowledge. The essence of this article is to give you some tips and tricks on how you can spy on WhatsApp messages. Some ways to…

Top 5 anonymous browsers

1st browser – Tor Browser Within the Tor network, traffic is redirected from one router to another and finally reaches the exit point from which the net (unencrypted) packet of data already reaches the original destination address (server). The traffic…

Windows Credentials Phishing

On Windows family operating systems, it is normal for some programs and processes to request user credentials for authentication (e.g. Outlook) to increase runtime privileges (User Account Control) or simply to exit the Windows LockScreen. Simulating this Windows behavior allows…

Hacking

Cybercriminals have different goals and methods of action. In some cases, the user may not realize that an unauthorized person has access to his or her computer. But what does this intruder want? What is the point of getting into…

4 best WIFI hacking techniques

1. Change and automatically generate a new MAC address when connected to Wi-Fi again MAC (Media Access Control) – a unique identifier issued to each unit of active equipment (i.e. network adapter, router, switch, etc.) or some of their interfaces….

Creating a website in the tor

Many people are wondering how to transfer the project to the torus network. If you do not know why you need to transfer your project to the .onion domain, this post is definitely not for you. For others, it may…

Block your smartphone microphone.

To protect the device from unauthorized voice recording through the microphone we developed an application – Microphone Block – Anti malware, from the same creators as Camera Block. The application programmatically blocks and disables microphone resources, as well as prohibits…

Editing (deleting) metadata

Metadata must be removed before it can be published, such as photos. Usually the file itself stores the coordinates of where and when the photo was taken, as well as the name of the device with which it was taken….

I/O redirection to Linux

In this lesson we will learn about the coolest feature of the command line: redirecting Input/Output. With this feature we will be able to redirect the input and output of commands from and to files, as well as compose whole…

Smartphone hacking using Kali

Kali is one kind of Linux, a program used by hackers and security specialists. It is a very popular and indispensable thing. I will not describe the pros and cons, but immediately get down to business: Step 1: Open the…

How do I know if your phone is tapped?

There are special spyware programs that are installed on mobile phones and allow other people, such as a competitor or a jealous spouse, to follow you. Parents who want to take full control of their child can also use such…

Get Wi-Fi password without hacking.

We need to get the password from Wi-Fi, but there’s no time to hack it? To help you in these situations, I’ll cover a virtually guaranteed way to get a Wi-Fi password without having to hack into it with Wifiphisher….

How to use winget: Windows 10 Package Manager

Microsoft’s new package manager Windows makes it easy to install applications with a single command. This article describes the Windows Package Manager and the new winget. What is the Windows package manager? Package managers are distributed on Linux. Instead of…