Vulnerability scanning is a crucial phase of a penetration test …
Read More »
June 11, 2022
Ubiquiti Dream Machine (UDM) – unable to connect to NBN
I don’t want the NBN ISP router running anymore and use Ubiquiti Dream Machine (UDM) instead. …
April 15, 2022
Quick Snap Cheat Sheet for Ubuntu
Snaps are app packages for desktop, cloud and IoT that are easy to install, secure, cross‐platform a…
February 11, 2022
Bypass 40X Response Codes with dontgo403
Bypass 40X Response Codes with dontgo403 …
January 27, 2022
Find Related Domains and Subdomains with assetfinder
assetfinder is a Go-based tool to find related domains and subdomains that are potentially related t…
November 30, 2021
Best ways to destroy Microsoft Windows
I take no responsibility for these collection of best ways to destroy Microsoft Windows! …
November 25, 2021
How to unhide menu bar in Virtualbox
So I went in and hid the top menu bar and bottom status bar in Virtualbox. After they disappeared, n…
November 24, 2021
Failed to open directory on Kali Linux Virtualbox
I added E:\Kali_Shared to my Kali Linux Virtualbox image and then tried to open it within Kali Linux…
November 23, 2021
HELK – An Open Source Threat Hunting Platform
The Hunting ELK or simply the HELK is an Open Source Threat Hunting Platform with advanced analytics…
November 17, 2021
Free Android Penetration Testing Toolkit & Risk Assessment
Free Android Penetration Testing Toolkit & Risk Assessment …
November 16, 2021
Output your microphone to a remote computers speaker
Output your microphone to a remote computers speaker …
Recent Posts
-
A very detailed guide on how to setup VPN on Kali Linux and Ubuntu
Every day millions of people uses different VPN service providers …
Read More » -
Complete solution for online privacy with own private OpenSSH, OpenVPN and VNC server
-
Enable VPN on Kali Linux – fix VPN grayed out problem
-
Advantages disadvantages of using Proxy vs VPN vs TOR vs TOR and VPN together.
-
Changing GRUB timeout in Kali Linux
I use Kali Linux alongside my Windows in my Laptop …
Read More » -
Install Angry IP Scanner on Kali Linux
-
Kali Linux remote SSH – How to configure openSSH server
-
How to Install Avro Phonetic Keyboard or ibus-avro in Debian, Kali, LMDE (Mint) Linux
-
What are the Challenges of Using Open Source Cybersecurity Tools?
By making their source code freely available, developers of open …
Read More » -
Advanced Persistent Threat Activity Exploiting Managed Service Providers
-
Install Angry IP Scanner on Kali Linux
-
Alert (TA14-017A) – UDP based Amplification Attacks
-
Output your microphone to a remote computers speaker
Output your microphone to a remote computers speaker
Read More » -
SSH through host in the middle
-
Three different ways to duplicate installed packages in multiple machines in Linux
-
ssh to machine behind shared NAT
-
How to check Network Interface details in Linux