Remotely Control Any PCs with this FREE software!
// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join
// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/
// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD
// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
by Loi Liang Yang
linux http server
I love your channel, thanks. I would love to have your knowledge to deal with the pshycho s im dealing daily they feel god 😢
Need help how I can remove password from pdf
Long process and it will never work in real life hacking we need a quick and active method
i just came here to like the video and watch the add becuz Loi is awesome ya'll god why cant i be this smart cryyyy
1:20 that was funny🤣
It was all great till I heard bruteforce…😢It's highly unrealistic and unlikely. Perhaps I'll return to this conversation with a name of the necessary tool to create your bruteforce password list that is more relevant and likely. It takes the target's social media data , birthdays, friends, loved ones and creates many possible passwords that are not as easy.
Please do a tutorial on how to install armitage and metasploit on Windows
I knee this fron day 1😂
hey fbi, i am watching this only for educational purposes and for curiosity.
🎉🎉🎉
I wanna know this: is kali linux can run in a mobile phone as main OS if it is plz teach us how to do
4:57 Germans be like:
Bro from lebanon i follow him he is a good person and he give you so many ideas😊
Reverse scammer hacking
mon said yes
ty boss
Where can i download Kali, need a serious link, can you send it to me, please?
hello loi sir can you make video how youtuber reverse connection on scammer and expose them please make video how they excess scammer pc sir
but when the victim install the file they will not let to go in what can i do
make something new … your every vidoes is approximatily on remotily control
Wgere do you live i want to learn all about hacking
Hi
Remotely controll any phone
Hii bro i am Harish from Chennai , i am a great fan of your work bro , Bro i am recently getting into some cyber security stuff like hacking and cryptography like that so i use my kali in virtual box , The problem is we can't connect wifi to our virtual box so i decided to buy a wifi adaptor to connect to wifi network and it help me to do some pentesting but the real problem came here when i try to connect my wifi adaptor to kali my wifi is not scanning any nearby devices, i have installed all my drivers and configured but still my wifi adaptor not scanning any nearby devices , i have try many times but still i can't get why this problem occurs kindly consider this message and make me a solution for this bro thank you ( i am using TP link t2u plus AC600 wifi adaptor)
This would never work on a random computer, if i were to do this to someone trying to remote into my computer, how would I know the RDP username and password? Bruteforcing is not enough, many people don't have those passwords
to the unfamiliar/unpractised the effect is like watching a magician do a card trick. brief explainers and performed at pace. not much gained
Thank you Mr Loi Liang Yang aka Hacker Loi. You are the king of ethical hacking (EH), cyber security education & YouTube EH tutorials. ☘️ ☘️ ☘️ 👽 👽 👽 🦎🦎🦎
please do cctv login pages like hikvision
pro
sir plz teach how to safeguard against these ??
Mom, Loi's trying to get me to hack myself again.
How can i baypass windows defender ?
My phone hacked like pygasus software and backdoor मैं उससे पता नही लगा पा रहा हु आप कुछ बताए
Wow🤩
Thanks for the content, but I guess the target is gonna be suspicious of the pop-ups and all the permissions granting and all that….
Is there anyway it can be done without it triggering any suspicion to the target and could it be done on the WAN?
bruh it is different
Can this remotely different network environment? seems like only same LAN then can happen right?
Podria hacer un vídeo como obtener la ip real cuando una web usa Clouflare?
The software contain back door
real
Hi a hacker