<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 08 Apr 2026 20:34:35 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@hack-tha-world/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[New Hacking Tutorials Coming Soon! Thank you for all your support!]]></title><description><![CDATA[I wanted to take a few moments and talk about the various tutorials I have planned. I've been busy with work but please know I plan on writing at least a tutorial a day starting within the next week. Thank]]></description><link>http://direct.ecency.com/hack/@hack-tha-world/new-hacking-tutorials-coming-soon-thank-you-for-all-your-support</link><guid isPermaLink="true">http://direct.ecency.com/hack/@hack-tha-world/new-hacking-tutorials-coming-soon-thank-you-for-all-your-support</guid><category><![CDATA[hack]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Mon, 25 Nov 2019 03:03:51 GMT</pubDate></item><item><title><![CDATA[Installing Malware On a Computer: Reverse Shells(Hacking-106a)]]></title><description><![CDATA[In this hands-on tutorial you'll install persistent malware on to a system. There are many methods to do so including: Uploading malware into webpage code(this tutorial) Using Metasploit to use pre-made]]></description><link>http://direct.ecency.com/hacking/@hack-tha-world/getting-malware-on-a-computer-reverse-shells-hacking-106a</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@hack-tha-world/getting-malware-on-a-computer-reverse-shells-hacking-106a</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Sat, 16 Nov 2019 00:33:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVJ2SVhDmmumdPfnVEcahMce9nMwwksSDdRvZdXF1cDXGaVEQy2MsXsigZwzoGKSjopa4hR2fKNG3LwkXeiLaZD7qKmV5xm3pfZriWAuYdMKXJDVbV8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Gaining Initial Access: Bruteforcing Wordpress Logins (Hacking-105a)]]></title><description><![CDATA[Wordpress powers 34% of websites & today you'll learn to hack it! You'll be able to apply this knowledge to 1 out of every 3 websites (over 75,000,000)! This tutorial will be broken up into two separate]]></description><link>http://direct.ecency.com/hacking/@hack-tha-world/hacking-tutorial-getting-initial-access-bruteforcing-wordpress-logins-hacking-105a</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@hack-tha-world/hacking-tutorial-getting-initial-access-bruteforcing-wordpress-logins-hacking-105a</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Wed, 06 Nov 2019 02:22:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPdNA3DrWywb22Eie3csnb8iZs8h1wgbCv4UkTQXPXS1s7XKkigKcaDoqdZoxeTh6hDFR57C79g?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Password Cracking Using Rainbow Tables & Hashcat (Hacking-104)]]></title><description><![CDATA[There are many reasons you may need to crack a password. Perhaps you are examining breach data or have stolen credentials and only have hashed passwords, or maybe you forgot the encryption keys to one]]></description><link>http://direct.ecency.com/hacking/@hack-tha-world/password-cracking-using-rainbow-tables-and-hashcat</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@hack-tha-world/password-cracking-using-rainbow-tables-and-hashcat</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Mon, 04 Nov 2019 22:31:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPZVLidc5bkSreXNi2sqr3ieKUAa1AeTmxaoQQ5Tqoox9g5MZ8BgVPonKFovh3UCpDGWfRRL4xE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Scanning A Target For Vulnerabilities(Hacking-103b)]]></title><description><![CDATA[Have you ever wondered how hackers find ways to break into a system? In this hands-on tutorial we're going to cover step by step methods of finding ways into systems. Even better we will do all this on]]></description><link>http://direct.ecency.com/hacking/@hack-tha-world/scanning-a-target-for-vulnerabilities-hacking-103b</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@hack-tha-world/scanning-a-target-for-vulnerabilities-hacking-103b</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Thu, 31 Oct 2019 21:36:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVJ2SVhDmmumdPfnVEcahMce9nMwwksSDdRvRJqt2aSKzRjsx23DT6pBHiXmEkqaa6cyaBXHEZoSTgSgoivmbZYeFWv52onQJect994JseyBmZ1BW8n?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Gathering OSINT Like a Hacker (Hacking-103a)]]></title><description><![CDATA[Today I'm going to teach you to perform recon on a REAL organization. This is the first(and most important) step in hacking. The organization we'll be performing recon on is hyatt.com. They have an open]]></description><link>http://direct.ecency.com/hacking/@hack-tha-world/perform-recon-like-a-boss-hacking-methodology-part-2a-gathering-osint</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@hack-tha-world/perform-recon-like-a-boss-hacking-methodology-part-2a-gathering-osint</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Wed, 30 Oct 2019 00:41:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVJ2SVhDmmumdPfnVEcahMce9nMwwksSDdRvZh5js2XZXhX7EAjP9Nw1NMVPTzYru3BJv49Ls2csSyAyCzHH7rntBXxS2FCFsAz8UtxBEnA1Epza6wY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Practice Hacking Real Machines Safely & Legally! (Hacking-102)]]></title><description><![CDATA[Today we're going to set up a purposely vulnerable machine to practice our hacking and get those 1337 ski11z. The machine we'll use is specifically chosen b/c it let introduces us to some of the most common]]></description><link>http://direct.ecency.com/hacking/@hack-tha-world/practice-hacking-on-a-real-machine-safely-and-legally-hacking-102</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@hack-tha-world/practice-hacking-on-a-real-machine-safely-and-legally-hacking-102</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Sun, 20 Oct 2019 01:43:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/9vWp6aU4y8kwSZ9Gw15LFL3aMdhmgmBBFMpDJregpdP329aKUbQLtPiKzVgku8vytmMet9YqbGUwGzeQV395MWZ578ZunHi7p5Mx1cHvYsE8bsPVfymzRUiQYVJSHiGAZkJQDmTvAzki18S9U?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Become a Terminal Ninja! Common Linux Commands( Linux 101 )]]></title><description><![CDATA[In this tutorial we're going to learn CLI commands everyone should know. If this is your first time messing with the CLI(aka terminal) and you find it daunting don't worry! Today you'll learn commands]]></description><link>http://direct.ecency.com/linux/@hack-tha-world/become-a-terminal-ninja-common-linux-commands-linux-101</link><guid isPermaLink="true">http://direct.ecency.com/linux/@hack-tha-world/become-a-terminal-ninja-common-linux-commands-linux-101</guid><category><![CDATA[linux]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Fri, 18 Oct 2019 02:46:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVJ2SVhDmmumdPfnVEcahMce9nMwwksSDdRvZCf8diHgeYx1E2pbnTdKvLtrixV5Bug3fi4QHSdXDSKstoiN8Dyeu1xvfZX7QsHEHw4wsiy8azucddQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hacking The Airlines: How To Save Up To 80% on Flights!]]></title><description><![CDATA[I love seeing corporations get the middle finger from your average consumer, and today I'm going to show you how to do just that. Forget about Priceline and all those other sites that claim to save you]]></description><link>http://direct.ecency.com/travel/@hack-tha-world/hacking-the-airlines-how-to-save-up-to-80-on-flights</link><guid isPermaLink="true">http://direct.ecency.com/travel/@hack-tha-world/hacking-the-airlines-how-to-save-up-to-80-on-flights</guid><category><![CDATA[travel]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Sun, 13 Oct 2019 19:44:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVJ2SVhDmmumdPfnVEcahMce9nMwwksSDdRvNbuRtrpqgXLB38Z5srJUMM59JnqeuZbuLKfXDLGoE16uRDCgGMEEGSy8tyDhtQRjHCFg2rbK1TAFgDt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Make a Forensic Copy of a File/Disk(Forensics-101)]]></title><description><![CDATA[In this hands-on tutorial you'll learn how forensic professionals make a forensic(bit-by-bit) copy of a file or hard disk. These same techniques are also used by the US military. There are several reasons]]></description><link>http://direct.ecency.com/security/@hack-tha-world/how-to-make-a-forensic-copy-of-a-file-disk-forensics-102</link><guid isPermaLink="true">http://direct.ecency.com/security/@hack-tha-world/how-to-make-a-forensic-copy-of-a-file-disk-forensics-102</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Sun, 13 Oct 2019 01:59:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruv8X2R8t7XDv5HGXyHWCCu4rKmbB5pmEzjYSedHfxEqFpUnD7WiE7Un6zaemiGvKWipqqJg2ksXu7yqWurtpCGLhDKAynKqjT1LuAEqk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hacking Methodology- A Step-by-Step Primer(Hacking-101)]]></title><description><![CDATA[Today we'll cover the tools and tactics a hacker or pentester takes to go about an operation. Every tool and step will be elaborated upon in depth in future tutorials but before we can get to that you]]></description><link>http://direct.ecency.com/hacking/@hack-tha-world/hacking-methodology-a-step-by-step-primer-hacking-101</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@hack-tha-world/hacking-methodology-a-step-by-step-primer-hacking-101</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Thu, 10 Oct 2019 21:48:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVJ2SVhDmmumdPfnVEcahMce9nMwwksSDdRvQoXyxfgsHSgYh6c7HBtWSjpNBRemor36Qzh9CUgceTj8KXNVow9WFpGoKPp4LwL1MjMxqvdQ846zYWa?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Buying Gift Cards & Burner Electronics Anonymously(PerSec109a)]]></title><description><![CDATA[It may seem simple to buy something in cash and be safe doing so but there are a few things you should keep in mind. This short but sweet guide will cover how to buy gift cards and burner electronics(such]]></description><link>http://direct.ecency.com/privacy/@hack-tha-world/buying-gift-cards-and-burner-electronics-anonymously-persec109a</link><guid isPermaLink="true">http://direct.ecency.com/privacy/@hack-tha-world/buying-gift-cards-and-burner-electronics-anonymously-persec109a</guid><category><![CDATA[privacy]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Thu, 10 Oct 2019 01:25:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/6VvuHGsoU2QBt9MXeXNdDuyd4Bmd63j7zJymDTWgdcJjo1TUeHqHonVED8zuySQTbEviFjwc377LD6kHCNT2eKPxjfXHAedEf658aPDRur2wSxUdCE9N7zjV6zifup?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Make Private & Anonymous Fiat Purchases Online(PersSec109b)]]></title><description><![CDATA[Your online payment info will one day be leaked. It's a matter of when, not if. And when it does criminals will have access to some of your most private data(though they probably already do). In this guide]]></description><link>http://direct.ecency.com/privacy/@hack-tha-world/make-private-and-anonymous-fiat-purchases-online-perssec109</link><guid isPermaLink="true">http://direct.ecency.com/privacy/@hack-tha-world/make-private-and-anonymous-fiat-purchases-online-perssec109</guid><category><![CDATA[privacy]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Wed, 09 Oct 2019 22:10:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPKK7m9E1oVGaxKpAUAJ4PqecKSrA5r32rmcCQPi2p5QKZdATm4wpgCWKpaUdvhZyqqAjUxe35Y?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Harden Your Browser Against Tracking & Attacks!(PersSec108)]]></title><description><![CDATA[Lurking within your browser are some very dangerous threats to your security. These threats are so severe that even with the best security practices if you don't address them it can result in complete]]></description><link>http://direct.ecency.com/privacy/@hack-tha-world/harden-your-browser-against-tracking-and-attacks-perssec108</link><guid isPermaLink="true">http://direct.ecency.com/privacy/@hack-tha-world/harden-your-browser-against-tracking-and-attacks-perssec108</guid><category><![CDATA[privacy]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Tue, 08 Oct 2019 21:03:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVJ2SVhDmmumdPfnVEcahMce9nMwwksSDdRvQFsngDrJYPUWhy3utA5pGHEd2xjRjCb938MwAmdnMM2GtgSS6jL5EGk6ZSScFPMuxzkEouWre2Tx42i?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How To Delete Meta-Data From Files To Maintain Your Privacy/Anonymity(PersSec107)]]></title><description><![CDATA[You've probably heard of how photos can have GPS location and camera model but did you know there are many more examples of files containing information that can identify you. In this tutorial I'm going]]></description><link>http://direct.ecency.com/privacy/@hack-tha-world/how-to-delete-meta-data-from-files-to-maintain-your-privacy-anonymity-perssec107</link><guid isPermaLink="true">http://direct.ecency.com/privacy/@hack-tha-world/how-to-delete-meta-data-from-files-to-maintain-your-privacy-anonymity-perssec107</guid><category><![CDATA[privacy]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Tue, 08 Oct 2019 01:05:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruv8X2R8t7XDv5HGXyHWCCu4rKmbB5pmEzjYSe7Kf83gtaYNM5EfjEhknBmh1jarmoUhSDuMPRFFmpMJYCmSfjWP3wLWyXqKpj8pvJ4Sz?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Encrypt Your Texts & Phone/Video Calls Using Signal on Windows, Linux, Android & IOS(PersSec106)]]></title><description><![CDATA[Have you ever wondered how you can keep the government and hackers from listening to your phone calls? How about being able to make a call or text that leaves no trace? That's exactly what we're going]]></description><link>http://direct.ecency.com/privacy/@hack-tha-world/encrypt-your-texts-and-phone-calls-using-signal-on-windows-linux-android-and-ios-perssec106</link><guid isPermaLink="true">http://direct.ecency.com/privacy/@hack-tha-world/encrypt-your-texts-and-phone-calls-using-signal-on-windows-linux-android-and-ios-perssec106</guid><category><![CDATA[privacy]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Mon, 07 Oct 2019 21:00:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/6VvuHGsoU2QBt9MXeXNdDuyd4Bmd63j7zJymDTWgdcJjnzjc9eotni46oe3pZYMVKmHyjTDQnuqfYjCxBM2FygbwAfmZ5Fef5CoPrKdcEUrrNMBny8r12suomhusbC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cover Your Tracks Like a Master Hacker Using Dual-VPN & TOR-VPN(PersSec105c)]]></title><description><![CDATA[Today I'm going to show you some of the most extreme ways you can cover your tracks & identity online. There are some situations in life where you REALLY need to be untraceable and not being so is]]></description><link>http://direct.ecency.com/privacy/@hack-tha-world/become-100-untraceable-using-dual-vpn-and-tor-vpn-perssec105c</link><guid isPermaLink="true">http://direct.ecency.com/privacy/@hack-tha-world/become-100-untraceable-using-dual-vpn-and-tor-vpn-perssec105c</guid><category><![CDATA[privacy]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Sun, 06 Oct 2019 23:35:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/RGgukq5E6HBM2jscGd4Sszpv94XxHH2uqxMY9z21vaqHt3FzjKNSiQ4ZR7RY7RJLQePwz7P7wFCU8Ca89CXnLnXfDvqhdD6FZ6SkZYCmbtJEdf5GpnHCpSBkK4Qc7N6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Create Virtual Machines For Hacking(Kali), 100% Anonymity(Whonix) & Increased Security(Windows)]]></title><description><![CDATA[In this post I'm going to teach you how to set up 3 different virtual machines that can be used for hacking as well as extreme privacy, anonymity and security. We will cover three different setups; one]]></description><link>http://direct.ecency.com/privacy/@hack-tha-world/create-virtual-machines-for-hacking-kali-100-anonymity-whonix-and-increased-security-windows</link><guid isPermaLink="true">http://direct.ecency.com/privacy/@hack-tha-world/create-virtual-machines-for-hacking-kali-100-anonymity-whonix-and-increased-security-windows</guid><category><![CDATA[privacy]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Sun, 06 Oct 2019 21:18:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/AmRc67RgYaWTCbCd1L4AQP82AFWYYzZC15DpSZWeSYgzVPWGG5JxxCVjXQzzGg2E1xN8hMWPdQZxmzMuptnJi28T3YAt2ftdn3rjAu1aV478W2yLSLuuDssLPw6kBkgr3aJKSB6C7RcbbWCwVp588reqGdDgdLjg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Set Up a Router VPN For More Secure/Anonymous VPN Tutorial(PersSec105b)]]></title><description><![CDATA[A VPN is great but it's not without it's downfalls. No matter the VPN you are still exposed to IP leaks at device start up, and possibly if the VPN app crashes. Additionally you may want to connect smart]]></description><link>http://direct.ecency.com/privacy/@hack-tha-world/set-up-a-router-vpn-for-more-secure-anonymous-vpn-tutorial-perssec105b</link><guid isPermaLink="true">http://direct.ecency.com/privacy/@hack-tha-world/set-up-a-router-vpn-for-more-secure-anonymous-vpn-tutorial-perssec105b</guid><category><![CDATA[privacy]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Sat, 05 Oct 2019 20:45:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruv8X2R8t7XDv5HGXyHWCCu4rKmbB5pmEzjYStNEFMuPT6Wh5JUt5uRLkRax9EVMaPoWwqZhm454XotjzycEGZRDQPybgFFJ8N8zAn24W?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Take Back Your Privacy & Online Identity With a VPN/TOR(PersSec105a)]]></title><description><![CDATA[Think your online life is private? Think again. Everything you do online is tracked, cataloged and sold in hundreds of ways and they know exactly who and where you are. Everywhere you go, everything you]]></description><link>http://direct.ecency.com/privacy/@hack-tha-world/take-back-your-privacy-and-online-identity-with-a-vpn-tor-perssec105a</link><guid isPermaLink="true">http://direct.ecency.com/privacy/@hack-tha-world/take-back-your-privacy-and-online-identity-with-a-vpn-tor-perssec105a</guid><category><![CDATA[privacy]]></category><dc:creator><![CDATA[hack-tha-world]]></dc:creator><pubDate>Sat, 05 Oct 2019 01:02:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/8SzwQc8j2KJZWBXFXnbnQ1FtoZhRqrTWozhqoqWHpGmpmoJQQ7bzTwUZqin8e3dHGHtPzYtcxHZ9oemjTw4wN245zP3qgeVx61V1nNarCYc9qNCfghU?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>