Loading...




Related Posts





Facebook Account Recovery Code Phishing - Email Scam

11 Sep 2023 Dip Ranjan Sharma

The Facebook Account Recovery Code Phishing scam is a phishing attempt that targets Facebook users. The scam involves sending an a fake email claiming that Facebook has received a request to reset the recipient's password.



Want to be a hacker post image

Want to be a Successful Hacker?

08 May 2023 Dip Ranjan Sharma

When you hear a word Hacker, The first thing comes to your mind is a person doing illegal activities using their computer. But reality is actually differ form that, Basically a hacker is a technical expert who uses their skill in different ways to solve problems or creating one.

Kali linux purple 2023.1

Kali Linux 2023.1 Purple Distro (Kali Purple & Python Changes) New Update

14 March 2023 Dip Ranjan Sharma

The blog discusses the Purple Distro's latest version of Kali Linux 2023.1, highlighting its new user interface, Python enhancements, and other upgrades like as updated documentation, security fixes, and new tools.

Kali linux useful commands

Useful Kali Linux Commands - Every user should know

21 Feb 2023 Dip Ranjan Sharma

In this article, We have list Top 10 Kali linux Commands that will help you to be a perfect coder. Theses commands should every kali linux user should know.

Facebook Account Hacking - Top 3 methods

Facebook Account Hacking - Top 3 methods

02 Sep 2022 Dip Ranjan Sharma

Phishing is the most common method to terminate someone's Facebook account. The most popular type of phishing is creating a fake login page, and send the link of page by e-mail or SMS or social media. The login page will look exactly like the Facebook login page.

Footprinting in Ethical Hacking

Footprinting in Ethical Hacking

25 Jun 2022 Dip Ranjan Sharma

Footprinting is defined as a method of gathering information about a target computer system and the entities they belong to. With the help of the gathered information about target computer system, a hacker can execute a successful cyber attack.

How to access the dark web using tor browser process

16 Jun 2022 Dip Ranjan Sharma

The Dark Web, or Dark Net, is a small part of the deep web that is kept hidden on purpose. Websites and data on the dark web do typically require a special tool to access. The Dark Web and Tor are often used by journalists and whistleblowers to exchange sensitive information, including Edward Snowden himself.

Top 10 Kali Linux Tools For Hacker Or Most Used Tools

16 Jun 2022 Dip Ranjan Sharma

Nmap is an open-source network scanner that is used to recon/scan networks. It is used to discover hosts, ports, and services along with their versions over a network. It sends packets to the host and then analyzes the responses in order to produce the desired results. It could even be used for host discovery, operating system detection, or scanning for open ports. It is one of the most popular reconnaissance tools.



Follow Us



© Lofi X Hacking, 2022. All Rights Reserved.