LATEST ARTICLES

HOW TO SCAN WHOLE INTERNET 3.7 BILLION IP ADDRESSES IN FEW MINUTES?

Cyber security audit and ethical hacking training professionals normally use scanner to scans the networks. Scanning every IP address on the internet isn’t an easy job, and if you...

Increase an XFS filesystem in RHEL 7 Or CentOS 7

This guide will explain how to grow an XFS filesystem on VMWare Virtual Machine without a reboot. Verify if your server has XFS file system (you...

How to Exfiltrate WPA2 WiFi Passwords Using Android & PowerShell

It's easier than you might think to hack into Wi-Fi routers using just one unrooted Android phone. This method doesn't require brute-forcing the password, a Windows OS for converting PowerShell scripts into...

4 Ways to Crack a Facebook Password & Protect Yourself from Them

We share our lives on Facebook. We share our birthdays and our anniversaries. We share our vacation plans and locations. We share the births of our sons and the...

The Best Wireless Network Adapter for Wi-Fi Hacking in 2019

To hack a Wi-Fi network using Kali Linux, you need your wireless card to support monitor mode and packet injection. Not all wireless cards can do this, so I've rounded up...

Kali Linux 2019.1 Release

Welcome to our first release of 2019, Kali Linux 2019.1, which is available for immediate download. This release brings kernel up to version 4.19.13, fixes numerous bugs, and includes many updated packages. Tool...

How To Send Ultra Secure Encrypted Email

In a world where Google and the NSA inspect every email, a truly secure email service would be a godsend. Several email systems have touted themselves as secure, but...

How to Turn an Android Phone into a Hacking Device Without Root

With just a few taps, an Android phone can be weaponized into a covert hacking device capable of running tools such as Nmap, Nikto, and Netcat — all without rooting the device.

How to Do a MitM Attack with Websploit

I assume most of you know what a Man in the Middle (MitM) attack is, but here is a diagram of a Man in the Middle attack. I...

The best free rootkit removal, detection and scanner programs

What is rootkit malware? A rootkit is a particularly nasty piece of malware that doesn’t behave like your typical virus. Rootkits insert themselves into the very heart of...