See all of our hand written guides.

Follow guides produced by the team.

Protect Yourself From Skype Resolvers

Skype resolvers – what do they do?Imagine a website, where you can simply put in a Skype username and press “Go” – and instantly you have their IP address.Well that’s simply what a Skype resolvers does; they fetch your IP from your Skype username.Unfortunately, it’s...

Windows Password Cracking

We are going to learn to understand and learn to crack windows passwordT A B L E O F C O N T E N T S :1 – What is NTLM?2 – How does NTLM work?3 – Windows Integrated Authentication4 – Pass the Hash5 – NTLM Relaying Methods (including EXTERNAL relaying)6 – Security...

Understanding Doxing and Footprint Removal

INDEX:– What is doxing?– Where do you begin?– What methods of gaining user info exist?– Googling– Social Media Websites– Social Engineering– Databases– Whois– Final Word– Credits– Sources– WebsitesWhat is doxing?Doxing (named after documents, “dox”) is the act of...

An Introduction To Computer Ethics

Table of Contents I. IntroductionII. Remain IncognitoIII. Protecting Yourselfi. Onlineii. OfflineIV. Resources     IntroductionThis guide is brought to you by Insight. Before I begin, I would first like to introduce myself. My name is .Sinister, and I will be...

Staying Safe Online (Basic)

We are going to be covering how to stay safe on the internet now there are a lot of benefits to this.1. You can hide your IP address which means you won’t get DDOS attacks sent to your home connection.2. To stay hidden on websites that you don’t want tracked by your...

How Malware Is Spread

First of all these methods are posted in order to allow you to understand basic methods people use to spread malware this should not be treated as a guide to spread malware.[Method 1]This strategy is a truly no doubt understood system yet regardless it lives up to...

Choose Your Password

There are a bunch of articles here on internets that speaks about the choice of a password. What stroke me in these is the lack of example.Authors usually say “Use a password of a minimal length of 8 characters”, without explaining. This kind of article never made me...

Safely Setup A Rat

So far it seems there are no clear tutorials on how to setup a fully functioning rat, i will add some extra security tips. Please note this is purely for educational purposes and should only be used in legal situations.What we will need.A Functioning Rat (DarkComet...

Tor : The Basics

How Tor has the answerThere are two key aspects to onion routing. First, the Tor network is composed of volunteers who use their computers as “nodes.” As mentioned earlier, during normal browsing, information travels across the Internet in packets. When a Tor user...

A Beginner Guide To Hacking

This in no way will turn you into a hacker just unskid yourself--Introduction--So you want to learn hacking? First we need to ask ourselves why we are doing this? Is it for financial gain? Is it because you watched Mr. Robot and are now hype? Once we have figured out...

PHP Sanitisation

In this little guide/post we will cover the basics of sanitisation in PHP, with some code snippets and why you should use them. User inputted data. If a user inputs data onto your site directly into a mysql database, it can often be a direct point of vulnrability. The...