Skip to content
Latest:
  • Tryhackme – Nmap
  • Tryhackme – Tutorial
  • Hacking social media accounts with Zphisher
  • Phishing 101 – The Basics
  • Social engineering 101 – Part 2
Invent Your Shit

Invent Your Shit

The Home of Creators

  • Home
  • Computer Science
    • Electronics 101
  • Projects
  • Programming
    • Python
    • Python Projects
  • Cybersecurity
    • Pentesting
    • Android hacking
    • CTF
      • Tryhackme
    • Web Server Hacking
    • Opsec
    • Social Engineering
  • how to
  • Whoami
  • Contact

Author: admin

Tryhackme - Nmap Walkthrough
CTF Tryhackme 

Tryhackme – Nmap

5 December 20225 December 2022 admin 0 Comments Capture The Flag, CTF, Nmap, Nmap Walkthrough, Scanning, Tryhackme, Tryhackme Nmap

In this walk through, we will be going through the Nmap room from Tryhackme. After completing this room, you will

Read more
CTF Tryhackme 

Tryhackme – Tutorial

1 November 20221 November 2022 admin 0 Comments Capture The Flag, CTF, THM, Tryhackme, Tutorial

In this article, we will be going through the TryHackMe room named “Tutorial” which covers accessing the TryHackMe network using

Read more
Hacking Social Media Accounts with Zphish
Cybersecurity Social Engineering 

Hacking social media accounts with Zphisher

20 September 202221 September 2022 admin 0 Comments cybersecurity, hacking social media, Phishing, Phishing course, social engineering, Zphish github, Zphisher tool

In this article, we are continuing our phishing course and going into the practical end of phishing. In the last

Read more
Phishing 101
Cybersecurity Social Engineering 

Phishing 101 – The Basics

7 August 20228 August 2022 admin 0 Comments cybersecurity, hacking, Phishing, Phishing 101, social engineering, Types of Phishing

In this article, we are starting our new short course on Phishing. In our last articles, we explore the art

Read more
social engineering 101 - part 2
Cybersecurity Social Engineering 

Social engineering 101 – Part 2

28 July 20228 August 2022 admin 0 Comments art of human hacking, cybersecurity, hacking, human hacking, social engineering, social engineering 2, social engineering part 1

In the last part of Social Engineering 101, we went on a ride and learn about what social engineering is,

Read more
social engineering 101
Cybersecurity Social Engineering 

Social Engineering 101 – Part 1

24 July 202224 July 2022 admin 0 Comments cybesecurity, hacking, human hacking, social engineering, social hacking 101

A man called a cellphone manufacturer and says, “Hey! This is Rick over Arlington Heights and I am looking for

Read more
How to do SMS and Call bombing on scammers
Cybersecurity Social Engineering 

How to do SMS and Call bombing on scammers?

23 November 202123 November 2021 admin 0 Comments how to do Call bombing, How to do SMS bombing, Kali Linux tutorial, SMS & Call bombing, SMS bombing on Kali Linux, social engineering, Tbomb, Tbomb Sctipt

Have you ever encountered those scam calls, where they try to rip you by those shady lottery win announcements? Well,

Read more
Kali-whoami - Stay anonymous while hacking
Cybersecurity Opsec 

Kali-whoami – Stay Anonymous while hacking

21 November 202121 November 2021 admin 1 Comment hacking, how to be anonymous, how to become anonymous while hacking, IP changing, kali linux, kali-whoami, operational security, opsec, tor

Hello and Welcome back, my aspiring hackers. How are you? Today, we will be learning, how we can be anonymous

Read more
How do hackers get your exact location ?
Android hacking Cybersecurity 

How do hackers get your exact location?

19 November 202119 November 2021 admin 0 Comments android hacking, cybersecurity, hacking, how to hack someone location, how to track a smartphone, how to track someone location, location access, location hacking, pen-testing, seeker Github, seeker.py

Hello and welcome back my aspiring hackers, Well, we are back with another hacking tutorial. Today, we will see how

Read more
Cyber Kill Chain
Cybersecurity Pentesting 

Understanding Cyber Kill Chain Methodology | Episode #3 |

7 May 20217 May 2021 admin 0 Comments cyber kill chain, cyber kill chain methodology, cybersecurity, hacking, kill chain, pen-testing

Hello and Welcome back, my aspiring hackers to our Pentesting series, where we learn pentesting and infosec from scratch. In

Read more
  • ← Previous

Recent Posts

  • Tryhackme – Nmap
  • Tryhackme – Tutorial
  • Hacking social media accounts with Zphisher
  • Phishing 101 – The Basics
  • Social engineering 101 – Part 2

Recent Comments

  • John Tanner on Kali-whoami – Stay Anonymous while hacking

Archives

  • December 2022
  • November 2022
  • September 2022
  • August 2022
  • July 2022
  • November 2021
  • May 2021
  • April 2021
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • June 2019

Categories

  • Android hacking
  • Computer Science
  • CTF
  • Cybersecurity
  • Electronics 101
  • how to
  • Opsec
  • Pentesting
  • Programming
  • Projects
  • Python
  • Python Projects
  • Social Engineering
  • tech news
  • Tryhackme
  • Web Server Hacking

Invent Your Shit is a place specially designed for creators, artists, innovators, and inventors. A place where knowledge is open source and learning is the goal. With the help of many enthusiastic authors and teachers. We as a community welcomes you.

Recent Posts

  • Tryhackme – Nmap 5 December 2022
  • Tryhackme – Tutorial 1 November 2022
  • Hacking social media accounts with Zphisher 20 September 2022
  • Phishing 101 – The Basics 7 August 2022
  • Social engineering 101 – Part 2 28 July 2022

Categories

  • Android hacking
  • Computer Science
  • CTF
  • Cybersecurity
  • Electronics 101
  • how to
  • Opsec
  • Pentesting
  • Programming
  • Projects
  • Python
  • Python Projects
  • Social Engineering
  • tech news
  • Tryhackme
  • Web Server Hacking
  • Contact
  • Home
  • Privacy
  • Social Engineering
  • Whoami
Copyright © 2023 Invent Your Shit. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.