I just reinstalled Kali 1.0.5 and successfully did apt-get update …
Read More »
June 11, 2022
Ubiquiti Dream Machine (UDM) – unable to connect to NBN
I don’t want the NBN ISP router running anymore and use Ubiquiti Dream Machine (UDM) instead. …
April 15, 2022
Quick Snap Cheat Sheet for Ubuntu
Snaps are app packages for desktop, cloud and IoT that are easy to install, secure, cross‐platform a…
February 11, 2022
Bypass 40X Response Codes with dontgo403
Bypass 40X Response Codes with dontgo403 …
January 27, 2022
Find Related Domains and Subdomains with assetfinder
assetfinder is a Go-based tool to find related domains and subdomains that are potentially related t…
November 30, 2021
Best ways to destroy Microsoft Windows
I take no responsibility for these collection of best ways to destroy Microsoft Windows! …
November 25, 2021
How to unhide menu bar in Virtualbox
So I went in and hid the top menu bar and bottom status bar in Virtualbox. After they disappeared, n…
November 24, 2021
Failed to open directory on Kali Linux Virtualbox
I added E:\Kali_Shared to my Kali Linux Virtualbox image and then tried to open it within Kali Linux…
November 23, 2021
HELK – An Open Source Threat Hunting Platform
The Hunting ELK or simply the HELK is an Open Source Threat Hunting Platform with advanced analytics…
November 17, 2021
Free Android Penetration Testing Toolkit & Risk Assessment
Free Android Penetration Testing Toolkit & Risk Assessment …
November 16, 2021
Output your microphone to a remote computers speaker
Output your microphone to a remote computers speaker …
Recent Posts
-
Fix “WARNING: The following packages cannot be authenticated!” in Kali Linux
-
Fix Java error Unsigned application requesting unrestricted access to system
-
How to run VLC player as root in Linux? Fixing “VLC is not supposed to be run as root. Sorry” error.
-
Accessing ESXi console screen from an SSH session
-
Free DoS Attack Tools
-
Advantages disadvantages of using Proxy vs VPN vs TOR vs TOR and VPN together.
What makes you truly anonymous and leaves next to no …
Read More » -
Complete solution for online privacy with own private OpenSSH, OpenVPN and VNC server
-
A very detailed guide on how to setup VPN on Kali Linux and Ubuntu
-
Enable VPN on Kali Linux – fix VPN grayed out problem
-
Install NVIDIA driver kernel Module CUDA and Pyrit on Kali Linux – CUDA, Pyrit and Cpyrit-cuda
In this guide, I will show how to install NVIDIA …
Read More » -
Scan website for vulnerabilities in Kali Linux using Grabber
-
20 things to do after installing Kali Linux 1.x
-
Fixing PulseAudio configured for per-user sessions … (warning) in Kali Linux and Debian
-
Identify PCI Driver. Ubuntu, Debian, Mint, CentOS, Fedora & all Linux distro
This guide shows how you can identify PCI Driver Chipset …
Read More » -
Crack a WEP key of an open network without user intervention with Wesside-ng
-
Troubleshooting Wireless Drivers in Kali Linux
-
Generate WiFi IVS dump with makeivs-ng on Kali Linux
-
In light of recent Linux exploits, Linux security audit is a must!
How many Linux vulnerabilities and exploits were exposed since …
Read More » -
Vulnerable docker environment for learning to hack
-
SecLists – Security Tester’s Companion
-
Alert (TA14-017A) – UDP based Amplification Attacks
-
Output your microphone to a remote computers speaker
Output your microphone to a remote computers speaker
Read More » -
SSH through host in the middle
-
Three different ways to duplicate installed packages in multiple machines in Linux
-
ssh to machine behind shared NAT
-
How to check Network Interface details in Linux