I want to become a professional hacker but can't find the right resources | Problem Solved
Welcome Note
Welcome! This is what you have been searching for. This post will be updated regularly so that you can easily navigate through this blog and its knowledge. Before we start I want to remind you of a very important perspective, take it as a caution.
It is always you who is responsible for the knowledge or wisdom you gained and also it is you who is responsible for your actions with your knowledge. Providing and sharing knowledge is primitive and the only way for any subject or culture to survive.
The above quote can be reduced to: "This blog is for Educational Purpose Only"
Social Media Platform for Hackers
Straight to the point: There are many social media platforms for regular groups and many of the Hacking/Programming/Cyber-Seciruty information groups are hosted on these platforms. But we at Leewardslope want to create a separate and dedicated platform for hackers and cybersecurity experts for organized discussions.
Want to join us and follow your favorite hacker and get realtime updates and news? Why wait then, Join Us at Leeward Hackers.
Under Construction, we will be back soon.
Content Navigation
Hacking is an art, and it takes years of practice to master it. So how to get started? Having no idea about hacking is okay, but being a newbie with computers, in general, is not allowed. When I say beginner, I mean someone who has no experience with programming and with hacking methodologies. I didn't mean someone who needs a one-page guide on how to download a tool. If you want to be a hacker, you have to work hard. So how to get started?
Introduction to Hacking
- What is Hacking
- Types of Hackers
- More on hacking
- Not being a noob
- Setting up a virtual machine to practice hacking
Creating a Virus
- Introduction
- Fork bomb
- Application Flooder
- Overloading Memory
- Wiping Out Memory
- Folder Blaster
- Frequently Asked Questions
- How to make your own virus
Fun Stuff
What is DDoSing?
Social Engineering
- Introduction
- The Art of Hunamm Hacking
- Phishing
Linux
- Installing Kali
- Recommended Reading
How to Hack WiFi
- Hacking WEP
- Hacking WPA
- More on Hacking WiFi
- Hacking WEP 2
- Recommended Books
Information Gathering
- Introduction
- Exploring NMap
- Information Gathering with theHarvester
Metasploit
- Introduction to Metasploit
- Command Crash Course
- Exploitation: Basics
- Exploitation: Examples
- Aurora
- The Heartbleed bug
- Hacking Webcams
- Remote Keyloggers
- Disabling Anti Virus
More Hacking Tools
- Wordlists with Crunch
- THC Hydra
Tor Browser
- Why Tor?
- How Tor Works
- Using Tor
- The Deep Web
Networking
- MAC Addresses
- What is MAC Address Spoofing?
- Spoofing on Android
- Spoofing on Windows
- Spoofing on OS X
Privacy
- The Zero Trust Principle
- Government Surveillance
- Choosing a Strong Password
- Using Proxies
- How to send secure mails using Proton Mail
- Recommended Reading
General
- Abbreviations
- Common Terms
- Common Tools
- The Ultimate Hacking Cheat Sheet
- Anonymous
- Hacking Facebook
- Rooting your Android Phone
- Website Hacks
- Understanding Viruses
- Uprooting Viruses
- On Hashes
- All About Cookies
- General Protection
- The CIA Rule Book of Malware Creation
- The best Documentaries for Hackers
- The Top 5 Books for Hackers
- Quantum Computing and Digital Security
- Going Pro
Others
- Programming 1
- Programming 2
- RAT's
- Limits of Legality