<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 29 Apr 2026 14:47:19 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@hackersploit/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[Deep Web Browsing - EP2 - HOW TO BUILD A UFO!]]></title><description><![CDATA[Hey guys HackerSploit here back again with another Deep Web Browsing episode, what will we encounter today? Deep Web Pizza, UFO's or something more sinister? Let's find out! The deep web, invisible web]]></description><link>http://direct.ecency.com/steemit/@hackersploit/deep-web-browsing-ep2-how-to-build-a-ufo</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@hackersploit/deep-web-browsing-ep2-how-to-build-a-ufo</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Sun, 09 Jul 2017 09:17:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e37SWp9MAcNLBo6Uz2CBDjYVRJ7LiZHFtZC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How To Setup Proxychains In Kali Linux - Stay Anonymous]]></title><description><![CDATA[Kali Linux has a perfect tool for anonymity, which will allow you to anonymize your entire system as you delve in to your creepy online behavior. This awesome tool is called Proxychains.]]></description><link>http://direct.ecency.com/steemit/@hackersploit/how-to-setup-proxychains-in-kali-linux-stay-anonymous</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@hackersploit/how-to-setup-proxychains-in-kali-linux-stay-anonymous</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Sat, 01 Jul 2017 04:15:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk2bRb9gatmwEsdvNEZvoNtARiu5atWt6cYUbQD5yjD8TB9aMruyfMY17z6tW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Best WiFi Hacking Apps For Android 2017]]></title><description><![CDATA[Android has always been at the forefront of exploits when it comes down to ethical hacking, and it comes as no surprise to see that Android has accumulated some of the best mobile Hacking solutions and]]></description><link>http://direct.ecency.com/steemit/@hackersploit/best-wifi-hacking-apps-for-android-2017</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@hackersploit/best-wifi-hacking-apps-for-android-2017</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Wed, 28 Jun 2017 14:39:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/mXkfdToSwHxyVySZpuLfU8yQ6r3QxqS7YGenoRHRF6Dndy1NURDiDdNPdV6RYeTib2S4aYo63BVwVmTXMngXgMTce7XLF9HE1HUxcirpe?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Steganography Tutorial - Hide Messages In Images]]></title><description><![CDATA[Steganography is the art of hiding messages in images.]]></description><link>http://direct.ecency.com/steemit/@hackersploit/steganography-tutorial-hide-messages-in-images</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@hackersploit/steganography-tutorial-hide-messages-in-images</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Tue, 27 Jun 2017 19:43:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eJMe6hXwmzTgh9L1BNwv571pxSS4a5s4AFY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Content Update]]></title><description><![CDATA[Milestone Reached! 30 Followers On Steemit!]]></description><link>http://direct.ecency.com/steemit/@hackersploit/12-easy-ways-to-maximize-battery-life-on-windows-10</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@hackersploit/12-easy-ways-to-maximize-battery-life-on-windows-10</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Fri, 23 Jun 2017 20:25:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXZ1L4r9DLNY6SZrqvu1xdvaxevWdmdhJHRhWU4habv8VRXTPVkAVoY4W77YjxTdX7H5PYagNUoQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Save Your Eyes From Computer Strain Using f.lux for Windows, Mac and Linux]]></title><description><![CDATA[No more watery eyes, when you wake up from sleep in the middle of the night to work on your bright computer screen. Your eye savior, f.lux is here. First things first, what is f.lux and why do you need]]></description><link>http://direct.ecency.com/steemit/@hackersploit/save-your-eyes-from-computer-strain-using-f-lux-for-windows-mac-and-linux</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@hackersploit/save-your-eyes-from-computer-strain-using-f-lux-for-windows-mac-and-linux</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Fri, 23 Jun 2017 20:16:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYgt7JcCB6GeAVFgRxA8VErgpK1s3idCbPFvYtR56uBHsJDhwfiPtQhJrvdPigZSxmCvLMRWdoc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Android O Likely To Be Called Oatmeal Cookie]]></title><description><![CDATA[Soon after we got to know that Android N would be called Android Nougat (Android Nutella was fan favorite), people jumped upon Android O and started making predictions. Just in case you’re unable to list]]></description><link>http://direct.ecency.com/steemit/@hackersploit/android-o-likely-to-be-called-oatmeal-cookie</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@hackersploit/android-o-likely-to-be-called-oatmeal-cookie</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Fri, 23 Jun 2017 17:23:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYMdHJxYx9QrvkVH6uPRMu3DkKG29Gw2AKPVoiBz9LGC1Bt9iz7k9SXSW1mU4EW8r3v2mxTKBfL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Programmers Who Use Spaces Earn More Money Than Those Who Use Tabs]]></title><description><![CDATA[Spaces versus Tabs: Who earns more? But, according to an early analysis of the raw data from the Stack Overflow 2017, the programmers who use spaces make more money than tabs-using coders. According to]]></description><link>http://direct.ecency.com/steemit/@hackersploit/programmers-who-use-spaces-earn-more-money-than-those-who-use-tabs</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@hackersploit/programmers-who-use-spaces-earn-more-money-than-those-who-use-tabs</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Thu, 22 Jun 2017 22:36:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYgb1kwHNyjkLLZiqfDM8zuNTJLmh4AkfN8xFGbBBVsUCh4KoZSNQchb3MRYp8qxZXZ3HRgm4WS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What Are Torrents? How Torrent Works?]]></title><description><![CDATA[What are torrents? How do torrents work? In a single word, torrents are simply ‘files’ that hold information related to other files and folders that are to be distributed. When you download a movie torrent,]]></description><link>http://direct.ecency.com/steemit/@hackersploit/what-are-torrents-how-torrent-works</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@hackersploit/what-are-torrents-how-torrent-works</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Thu, 22 Jun 2017 21:01:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYkji46TtXdq7SyjJyoRqRc862kvpUg2D8UbtJtogTZNoDq8FJdWF4C392tEatvEqtAaGy3emca?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Computer Science vs. Computer Engineering: What’s The Difference?]]></title><description><![CDATA[Computer science and computer engineering: Difference and similarities While the names of computing courses have become more standard and you can get a pretty good idea of what you’re going to learn, people]]></description><link>http://direct.ecency.com/tutorial/@hackersploit/computer-science-vs-computer-engineering-what-s-the-difference</link><guid isPermaLink="true">http://direct.ecency.com/tutorial/@hackersploit/computer-science-vs-computer-engineering-what-s-the-difference</guid><category><![CDATA[tutorial]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Thu, 22 Jun 2017 20:55:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXa3zjiFd3o2MAx5CNQbmAZ7Z17znhJVYbW8HducXMGopNgE9qsy15M3ZRGYcqUj54EfKz6cAGFg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How To Make Firefox Faster - Enabling Multi-process Electrolysis]]></title><description><![CDATA[Enable Firefox Multi-Process manually You can check if multi-process is already enabled on your Firefox by typing about:support in the address bar. t would be better if, you create a new Firefox profile]]></description><link>http://direct.ecency.com/steemit/@hackersploit/how-to-make-firefox-faster-enabling-multi-process-electrolysis</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@hackersploit/how-to-make-firefox-faster-enabling-multi-process-electrolysis</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Thu, 22 Jun 2017 18:49:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXZivcQvdLeJ4anjXubeTGhYwyNXkm8iEG5X5ExqFNgwWyFjLdJiyj3igM1qKZFUQZzEJViUv9F4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Stephen Hawking Says Moon Mission By 2020 Is Important To Ensure Survival Of Our Species]]></title><description><![CDATA[Stephen Hawking, a theoretical physicist, and cosmologist comprehended at a Starmus Science Festival that humans need to leave Earth within the next 100 years. He said humans should aim to set lunar bases]]></description><link>http://direct.ecency.com/steemit/@hackersploit/stephen-hawking-says-moon-mission-by-2020-is-important-to-ensure-survival-of-our-species</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@hackersploit/stephen-hawking-says-moon-mission-by-2020-is-important-to-ensure-survival-of-our-species</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Thu, 22 Jun 2017 18:36:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYmbHjL2JF8Tm2RH74rWEZtA1grhZDhwKivrNU8BWhzRgSqX9nJ9YMNeSZ5oceLXDnWieeEF5zE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How To Setup A Honeypot In Kali Linux]]></title><description><![CDATA[The Pentbox is a safety kit containing various tools for streamlining PenTest conducting a job easily. It is programmed in Ruby and oriented to GNU / Linux, with support for Windows, MacOS and every systems]]></description><link>http://direct.ecency.com/steemit/@hackersploit/how-to-setup-a-honeypot-in-kali-linux</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@hackersploit/how-to-setup-a-honeypot-in-kali-linux</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Thu, 22 Jun 2017 02:37:06 GMT</pubDate></item><item><title><![CDATA[Best iPhone Hacking Apps And Tools - 2017]]></title><description><![CDATA[When it comes down to device exploits Android usually holds the front page in the Hacking scene, but have you ever wondered about the exploit side of the Iphone ecosystem, well here are some tools that]]></description><link>http://direct.ecency.com/steemit/@hackersploit/best-iphone-hacking-apps-and-tools-2017</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@hackersploit/best-iphone-hacking-apps-and-tools-2017</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Wed, 21 Jun 2017 22:07:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYwDgiEA8G8DryfTU8zAYrub57q4A3k2obbKd5cp5165TuA5qpdWCKPYdhqzNbaFdLCkvZAUUce?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to play with fidget spinner in Google search?]]></title><description><![CDATA[Earlier today, some Redditors discovered that one could play with a fidget spinner right in the search result page. To do so, one simply needs to search the word “spinner” in Google and a virtual spinner]]></description><link>http://direct.ecency.com/steemit/@hackersploit/how-to-play-with-fidget-spinner-in-google-search</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@hackersploit/how-to-play-with-fidget-spinner-in-google-search</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Wed, 21 Jun 2017 16:38:57 GMT</pubDate></item><item><title><![CDATA[Steganography in Kali Linux – Hiding data in image]]></title><description><![CDATA[Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. Generally, the hidden messages appear to be (or be part of) something else: images,]]></description><link>http://direct.ecency.com/steemit/@hackersploit/steganography-in-kali-linux-hiding-data-in-image</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@hackersploit/steganography-in-kali-linux-hiding-data-in-image</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Wed, 21 Jun 2017 16:33:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYTGpP8u16YiYsTm82Qpdwh9YpLNeU9YnkcfYLN1yEETFbwUoFueLQ78UhQhpX1JskXuZGaB5pr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How To Clone A Website With wget On Linux]]></title><description><![CDATA[GNU Wget is a free software package for retrieving files using HTTP, HTTPS and FTP, the most widely-used Internet protocols. It is a non-interactive commandline tool, so it may easily be called from scripts,]]></description><link>http://direct.ecency.com/steemit/@hackersploit/how-to-clone-a-website-with-wget-on-linux</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@hackersploit/how-to-clone-a-website-with-wget-on-linux</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Sat, 17 Jun 2017 23:40:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eAgfzrsBRGzfYDL9SUJKakuBYSXNc8sCYjG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[SQL Injection Tutorial For Beginners - Kali Linux]]></title><description><![CDATA[SQL injection is a code injection technique, used to attack data driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents]]></description><link>http://direct.ecency.com/tutorial/@hackersploit/sql-injection-tutorial-for-beginners-kali-linux</link><guid isPermaLink="true">http://direct.ecency.com/tutorial/@hackersploit/sql-injection-tutorial-for-beginners-kali-linux</guid><category><![CDATA[tutorial]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Sun, 04 Jun 2017 22:19:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eMzngTQXAB6pZ99SFZJ7n1ukKLPRnTmickN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Parrot OS 3.5 Review | The Best Kali Linux Alternative]]></title><description><![CDATA[Security GNU/Linux distribution designed with cloud pentesting and IoT security in mind. It includes a full portable laboratory for security and digital forensics experts, but it also includes all you]]></description><link>http://direct.ecency.com/introduceyourself/@hackersploit/parrot-os-3-5-review-or-the-best-kali-linux-alternative</link><guid isPermaLink="true">http://direct.ecency.com/introduceyourself/@hackersploit/parrot-os-3-5-review-or-the-best-kali-linux-alternative</guid><category><![CDATA[introduceyourself]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Sun, 04 Jun 2017 22:05:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e6jJM2HBdWgaHppRzr2aW8six5nTFMVeDrN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Best Hacking Apps For Android 2017!]]></title><description><![CDATA[Welcome to the best Hacking Apps for Android ! Apps in showcase: Zanti,Netcut,Orbot,Termux,Geek App Links: Zanti: Orbot: NetCut: Termux: Geek App: I Hope you enjoy/enjoyed the video. If you have any questions]]></description><link>http://direct.ecency.com/android/@hackersploit/best-hacking-apps-for-android-2017</link><guid isPermaLink="true">http://direct.ecency.com/android/@hackersploit/best-hacking-apps-for-android-2017</guid><category><![CDATA[android]]></category><dc:creator><![CDATA[hackersploit]]></dc:creator><pubDate>Sun, 04 Jun 2017 21:43:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e2EknWK4WiaqPGxz7sV25Fbqk5XN8Vv3rva?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>