I’ve got this Gigabyte Motherboard GA-P35-DS3L (rev. 2.0) in my old desktop running Q6600 Quad Code CPU …
Read More »-
Fix Java error Unsigned application requesting unrestricted access to system
Tried to login to one of my server that requires Java and immediately got this …
Read More » -
New Mozilla Firefox Version 37.0 fixed 13 security issues and introduced Opportunistic Encryption support
-
How to Install Google Chrome in Kali Linux? – Part 3 – Running Chrome
-
How to Install Google Chrome in Kali Linux? – Part 2 – Installation
-
How to Install Google Chrome in Kali Linux? – Part 1 – Discussion
-
Output your microphone to a remote computers speaker
Output your microphone to a remote computers speaker
Read More » -
SSH through host in the middle
-
Three different ways to duplicate installed packages in multiple machines in Linux
-
ssh to machine behind shared NAT
-
How to check Network Interface details in Linux
-
Crack a WEP key of an open network without user intervention with Wesside-ng
Wesside-ng is an auto-magic tool which incorporates a number of techniques to seamlessly obtain a …
Read More » -
Gain root access in macOS High Sierra #iamroot
-
Wireless WPA2 password cracking using KRACK attacks
-
Find Linux Exploits by Kernel version
-
Cracking password in Kali Linux using John the Ripper
-
14 top data recovery softwares – Data rescue tools
Data recovery is the process of salvaging and handling the data through the data from …
Read More »
-
How to edit files inside Docker container?
How to edit files inside Docker container
Read More » -
How to fix “Got permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock error
-
Install Docker and Portainer
-
How to disable touchscreen on Ubuntu?
-
Install and Run Citrix Workspace on Linux
-
Install MATE Desktop in Kali Linux 2.x (Kali Sana)
MATE is a fork of GNOME 2. It provides an intuitive and attractive desktop environment …
Read More » -
Use different wallpapers on multiple monitors in Linux
-
Fixing resolution problem on Linux after locking workstation
-
Conky Manager on Debian and Kali Linux
-
Install Cairo-Dock in Kali Linux
-
How to create a Bot Net legally? Put that in your ToS, that’s how!
This is a #rant post, TL'DR. In summary, you can just create a Chrome, Firefox, iOS, Android extension/plugin/app for free, let it grow bigger overtime and then just sell idle users bandwidth to Bot Net for profit. And you just put that somewhere in your looong ToS that everyone just presses "I Agree, get it over with and let me use the service already".
Read More » -
DoS website in Kali Linux using GoldenEye
-
Denial-of-service Attack – DoS using hping3 with spoofed IP in Kali Linux
-
World Live DDoS attack maps – Live DDoS Monitoring
-
hpssacli command on ESXi and adding new Disk to ESXi host
I ran into some snag when I tried to add a new HDD to my …
Read More » -
Fix for Prolific USB to Serial RJ45 Ethernet Code 10 error
-
Identify USB Driver. Ubuntu, Debian, Mint, CentOS, Fedora & all Linux distro
-
Identify PCI Driver. Ubuntu, Debian, Mint, CentOS, Fedora & all Linux distro
-
Penetration Testing Tools for Beginners
Penetration tools for beginners. Karkinos is a light-weight Beginner Friendly Penetration Testing Tool, which is basically a ‘Swiss Army Knife’ for pen-testing and/or hacking CTF’s.
Read More » -
Detect SQL Injection (SQLi) and XSS
-
Machine Learning Network Share Password Hunting Toolkit
-
Vulnerable docker environment for learning to hack
-
Exploit ACL Based Privilege Escalation Paths in Active Directory
-
Bypass Web Application Firewall using WAFNinja
WAFNinja is a CLI python tool that helps penetration testers to bypass Web Application Firewall …
Read More » -
dns2proxy – Offensive DNS server post-explotation tool – DNS spoofing, phishing and pharming
-
Free DoS Attack Tools
-
DoS website using slowhttptest in Kali Linux – slowloris, slow HTTP POST and slow Read attack in one tool
-
How to create a Bot Net legally? Put that in your ToS, that’s how!
-
Ubiquiti Dream Machine (UDM) – unable to connect to NBN
I don’t want the NBN ISP router running anymore and use Ubiquiti Dream Machine (UDM) …
Read More » -
Communicate via an WEP-encrypted access point with easside-ng
-
OSI Layers – Please Do Not Tell Secret Passwords Anytime
-
Check download speed from Linux terminal
-
How to get Public IP from Linux Terminal?
-
Can’t connect to WiFi in Linux
So I installed the latest version of Kali Linux from USB into my RAZER Blade …
Read More » -
Generate WiFi IVS dump with makeivs-ng on Kali Linux
-
Information gathering and correlation with Unicornscan on Kali Linux
-
Configure, Tune, Run and Automate OpenVAS on Kali Linux
-
Install, setup, configure and run OpenVAS on Kali Linux
-
How to Prevent DOM-based Cross-site Scripting
There’s no denying the role that JavaScript has played in making web applications the sleek, …
Read More » -
What are the Challenges of Using Open Source Cybersecurity Tools?
-
Setting Up A Free TLS/SSL Certificate With “Let’s Encrypt”
-
Probably moving to Upcloud server from Azure
-
Video – Triple Your WiFi Speed
-
Automated Penetration Testing with APT2 Toolkit
APT2 is an Automated Penetration Testing Toolkit. This tool will perform an NMap scan, or …
Read More » -
How to search exploits in metasploit?
-
Fix Metasploit error “The following options failed to validate: RHOSTS”
-
Start Metasploit Framework in Kali Linux
-
How to configure automatic updates in Ubuntu Server
This guide explains how to configure automatic updates in Ubuntu Server 20.04. This tutorial is …
Read More » -
How to check Network Interface details in Linux
-
A .vimrc config file everyone should use
-
Remove cloud-init from Ubuntu
-
Find exact installation date of Linux
-
SamSam Ransomware
The Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) and the …
Read More » -
New Exploits for Unsecure SAP Systems
-
Microsoft Operating Systems BlueKeep Vulnerability
-
How to Prevent DOM-based Cross-site Scripting
-
CYBERFORCE Profile Series: Transforming Technical Conversations with a Best Practice Assessment
-
Introducing Kali Linux NetHunter and NetHunter supported devices
Featured: The Kali Linux NetHunter project is the first Open Source Android penetration testing platform …
Read More »
-
Quick Snap Cheat Sheet for Ubuntu
Snaps are app packages for desktop, cloud and IoT that are easy to install, secure, …
Read More » -
Use any Linux applications through a proxy (apt-get, wget etc)
-
How to configure automatic updates in Ubuntu Server
-
vcgencmd command not found
-
Install Docker and Portainer
-
Kali Linux 1.0.7 kernel 3.14 install NVIDIA driver kernel Module CUDA and Pyrit – CUDA, Pyrit and Cpyrit-cuda
In this guide, I will show how to install NVIDIA driver kernel Module CUDA, replace …
Read More » -
Install NVIDIA driver kernel Module CUDA and Pyrit on Kali Linux – CUDA, Pyrit and Cpyrit-cuda
-
20 things to do after installing Kali Linux 1.x
-
How to install Pyrit in Kali Linux?
-
How to install CAL++ in Kali Linux?
-
20 things to do after installing Kali Linux 1.x
20 things to do after installing Kali Linux 1.x I’ve compiled a small list of …
Read More » -
Fix sound mute in Kali Linux on boot
-
WPSCAN and quick wordpress security
-
Cracking Wifi WPA/WPA2 passwords using Reaver-WPS
Reaver-wps performs a brute force attack against an access point’s WiFi Protected Setup pin number. …
Read More »
-
Take picture of unauthorized user trying to access your Laptop
Did you ever tried to guess your friends password? Did you ever tried to login …
Read More » -
Crack passwords in Kali Linux with Hydra
-
Man in the Middle Attack using Kali Linux – MITM attack
-
Cracking password in Kali Linux using John the Ripper
-
Hack Windows PC to get Windows password NTLMv2 hash
-
Use any Linux applications through a proxy (apt-get, wget etc)
It's pretty normal in many Organizations to use get servers to connect to Internet via a Proxy. In most cases it's for updating apt-get or yum via proxy. However, quite often you might need to download packages directly using wget or curl and setting up apt-get or apt via proxy, wget via proxy, curl via proxy is a pain. What if you could simply setup a Proxy and just use any applications to use that using a simply command? I faced this many times and hence writing this guide. Note that if you're only allowing apt-get via proxy then stick with configuring /etc/apt.conf or /etc/apt/conf.d/00proxy or something similar but if you need to allow different applications via a proxy then this method is best and simplest.
Read More » -
Fixing ProxyChains ERROR: ld.so: object ‘libproxychains.so.3’ from LD_PRELOAD cannot be preloaded: ignored.
-
WPSeku – WordPress Security Scanner
WPSeku is a black box WordPress vulnerability scanner that can be used to scan remote …
Read More » -
Denial of Service Attack Proof of Concept PHP Exploit for <=4.0 WordPress DoS Attack - CVE-2014-9034
-
WPSCAN and quick wordpress security – Fixing Direcroty Listing – Part 2
-
WPSCAN and quick wordpress security
-
WPSCAN and quick wordpress security – Fixing Direcroty Listing – Part 2
This is a part 2 of the guide WPSCAN and quick wordpress security. It guides …
Read More » -
WPSCAN and quick wordpress security
-
How to unhide menu bar in Virtualbox
So I went in and hid the top menu bar and bottom status bar in Virtualbox. After they disappeared, now I cannot find out how to unhide those. Took me a little bit time to figure out, hence this post so that I don't forget it and someone else having the same to unhide menu bar in Virtualbox can find this.
Read More » -
Failed to open directory on Kali Linux Virtualbox
-
How to install VirtualBox Guest Additions in Kali Linux (Kali Rolling / Kali Linux 2016.2 / Kali 2017)
-
Correct way to install Virtualbox Guest Additions packages on Kali Linux and create shared folders
-
A detailed guide on installing Kali Linux on VirtualBox
-
Advantages disadvantages of using Proxy vs VPN vs TOR vs TOR and VPN together.
What makes you truly anonymous and leaves next to no trace in the internet? In …
Read More » -
Complete solution for online privacy with own private OpenSSH, OpenVPN and VNC server
-
Free VPN providers of 2015
-
A very detailed guide on how to setup VPN on Kali Linux and Ubuntu
-
Enable VPN on Kali Linux – fix VPN grayed out problem
-
PuTTY alternatives
PuTTY is the most popular SSH client for Windows based systems. In fact it’s so …
Read More » -
Top 30 SSH shenanigans
-
Building updated Kali Linux ISO
-
Create SSH shortcut in Linux
-
5 ways to change GRUB background in Kali Linux
-
Format Linux USB Drive to recover full disk space in Windows 10
This is quite a common problem when you have a USB Disk that was used …
Read More » -
USB and SSD drive speedtest in Linux
-
Fix for Prolific USB to Serial RJ45 Ethernet Code 10 error
-
Create Kali Bootable Installer USB Drive in Windows 10 (Kali Bootable Non-Persistence USB Drive)
-
Identify USB Driver. Ubuntu, Debian, Mint, CentOS, Fedora & all Linux distro
-
telus.com spam emails to gmail account
Just something I bumped into this morning and decided to quickly write a post. Woke …
Read More » -
The 10 Worst Spammers in the World
-
Shortest spam run ever – domaincop.org Domain Abuse Notice Spam
-
Three effective solutions for Google Analytics Referral spam
-
[Updated] darodar.com referrer spam and should you be worried?
-
Can’t connect to WiFi in Linux
So I installed the latest version of Kali Linux from USB into my RAZER Blade …
Read More » -
Cyber Actors Target Home and Office Routers and Networked Devices Worldwide
-
Automatically crack WiFi password with besside-ng
-
Forging ARP, UDP, ICMP or custom packets with packetforge-ng
-
Crack a WEP key of an open network without user intervention with Wesside-ng