Welcome Note

Welcome! This is what you have been searching for. This post will be updated regularly so that you can easily navigate through this blog and its knowledge. Before we start I want to remind you of a very important perspective, take it as a caution.

It is always you who is responsible for the knowledge or wisdom you gained and also it is you who is responsible for your actions with your knowledge. Providing and sharing knowledge is primitive and the only way for any subject or culture to survive.

The above quote can be reduced to: "This blog is for Educational Purpose Only"

Social Media Platform for Hackers

Straight to the point: There are many social media platforms for regular groups and many of the Hacking/Programming/Cyber-Security information groups are hosted on these platforms. But we at Leewardslope want to create a separate and dedicated platform for hackers and cybersecurity experts for organized discussions.

Want to join us and follow your favorite hacker and get real-time updates and news? Why wait then, Join Us at Leeward Hackers.

Under Construction, we will be back soon.

Content Navigation

Hacking is an art, and it takes years of practice to master it. So how to get started? Having no idea about hacking is okay, but being a newbie with computers, in general, is not allowed. When I say beginner, I mean someone who has no experience with programming and with hacking methodologies. I didn't mean someone who needs a one-page guide on how to download a tool. If you want to be a hacker, you have to work hard. So how to get started?


Introduction to Hacking

Creating a Virus

Fun Stuff

What is DDoSing?

Social Engineering

  • Introduction
  • The Art of Hunamm Hacking
  • Phishing

Linux

  • Installing Kali
  • Recommended Reading

How to Hack WiFi

  • Hacking WEP
  • Hacking WPA
  • More on Hacking WiFi
  • Hacking WEP 2
  • Recommended Books

Information Gathering

  • Introduction
  • Exploring NMap
  • Information Gathering with theHarvester

Metasploit

  • Introduction to Metasploit
  • Command Crash Course
  • Exploitation: Basics
  • Exploitation: Examples
  • Aurora
  • The Heartbleed bug
  • Hacking Webcams
  • Remote Keyloggers
  • Disabling Anti Virus

More Hacking Tools

  • Wordlists with Crunch
  • THC Hydra

Tor Browser

  • Why Tor?
  • How Tor Works
  • Using Tor
  • The Deep Web

Networking

  • MAC Addresses
  • What is MAC Address Spoofing?
  • Spoofing on Android
  • Spoofing on Windows
  • Spoofing on OS X

Privacy

  • The Zero Trust Principle
  • Government Surveillance
  • Choosing a Strong Password
  • Using Proxies
  • How to send secure mails using Proton Mail
  • Recommended Reading

General

  • Abbreviations
  • Common Terms
  • Common Tools
  • The Ultimate Hacking Cheat Sheet
  • Anonymous
  • Hacking Facebook
  • Rooting your Android Phone
  • Website Hacks
  • Understanding Viruses
  • Uprooting Viruses
  • On Hashes
  • All About Cookies
  • General Protection
  • The CIA Rule Book of Malware Creation
  • The best Documentaries for Hackers
  • The Top 5 Books for Hackers
  • Quantum Computing and Digital Security
  • Going Pro

Others

  • Programming 1
  • Programming 2
  • RAT's
  • Limits of Legality