This information was pased on to me by crypto big thanks to you!!!
BE SURE TO VISIT CRYPTO'S PAGE.
This website was made as a set information on how to be safe
This was made by logan my kik name
Hey, I've wrote this script just for people like you.
I understand that you want to hack.
Thing is, there is no one click hack tool/script.
So, if you want to keep learning, continue.
Hacking takes time, curiousity, thinking, and seriousness.
Hacking consists of several things.
other smaller things
Exploits are what make hackers go.
XSS - Exploits
It's what deanonymizes tor users.
It's what helps hackers go farther.
It's what hacking is for the most part.
Not all exploits are breaking code.
Some links for exploits are...
Exploits can be written
in python, bash, or any
Kali Linux is an OffSec OS.
OffSec, Offensive Security, Hacking.
Kali offers tons of tools, such as metasploit.
Kali can operate as a functional main-os but
it's better to not keep it as a main os.
It's very unstable, and is a pain to use
sometimes. Also, do not add Kali
repositories to any other operating system.
It will break your other OS.
But. Kali Linux is a good operating system
for a virtual machine. It's good for hacking.
It has tools for...
On top of that, it is decently secure when
only using Kali repositories.
0x3 Custom Scripts
Custom scripts/tools are what make you go
from skid, no decent hacker. I personally
write scripts to encrypt files, and for
information gathering and doxing.
A custom script can be the difference
from a script that almost-just almost
works and actually does work because you
coded it to fit your needs.
Kali might not have everything you need.
But, when you can code, you do.
The big thing. Crypto. Encryption. Ciphers.
First off in crypto. You need a vpn.
A vpn will hide what you are doing from
other hackers, your ISP, and the gov't.
The gov't, obviously, doesn't like hackers.
They will arrest you if you are caught
doing things you shouldn't and you will
be put away doing hard time for a long time.
You need a vpn that does not log.
Logging can include:
Sites connected too
IP that conencts to the server
Your traffic overallTimes connected/disconnected
And with that information (especially your ip)
you can be found by any decent hacker, or any
stupid gov't. Especially hardened governments.
There are several vpns that don't log.
But, if you don't want to trust another company
then you can buy a vps/dedicated server (better
to buy a vps.) Setting up a vpn isn't hard.
Some vpns I personally trust would be:
MullvadVPN (portfowarding on this one)
And maybe TorGuard, but I had to rape one of their companies
for spreading rootkits. I don't know if they spread them now
but you can always take your chances.
Another piece of cryptography would be your hard drive.
You want all harddrives encrypted. If a figure steals
your hard drives, then you don't want any incriminating
evidence on that drive to put you in prison.
Keeping your hard drive encrypted is an important thing.
0x5 Extra Stuff
Some other things to keep in mind is good opsec, never admit
to anything, don't act cocky.
You never know who is better than you.
Don't act cocky because you could get fucked up
by someone who is a thousand times better than you
and would've been willing to teach you
if you hadn't been acting so cocky and tough.
Good opsec (Operation Security) would be usernames, passwords, emails, vpns.
Never use the same username anywhere.
Never use the same password anywhere.
Never use the same e-mail anywhere.
Keep rotating your vpn ip around.
Don't admit to anything online.
You never know who is a federal agent. (fed)
You never know who is just logging to push you over in the future.
You never know who wants to get rid of hackers.
Also: You will get the people
who have dealt with hackers and
were fucked over before, so they secured