How to Turn an Android Phone into a Hacking Device Without Root

With just a few taps, an Android phone can be weaponized into a covert hacking device capable of running tools such as Nmap, Nikto, and Netcat — all without rooting the device.

Cerberus Linux v1 Subsystem for Windows 10!

Cerberus Linux subsystem is Linux to run on top windows! like the picture bellow^^^ Cerberus linux v1 tools and extras : 15 new Cerberus Frameworks...

Build a Beginner Hacking Kit with the Raspberry Pi 3 Model B+

If you want to follow Our tutorials and try out Kali Linux, the Raspberry Pi is a perfect way to start. In 2018, the Raspberry Pi 3 Model B+ was released featuring a better...

20 Linux Command Tips and Tricks That Will Save You A Lot of Time

You might already know a few of these Linux command tips or perhaps all of it. In either case, you are welcome to share your favorite tricks in the comment section. Some...

How to Exfiltrate WPA2 WiFi Passwords Using Android & PowerShell

It's easier than you might think to hack into Wi-Fi routers using just one unrooted Android phone. This method doesn't require brute-forcing the password, a Windows OS for converting PowerShell scripts into...

How To Reset Root User Password In CentOS/RHEL 7

Normally resetting the root password is a simple task if you’re logged in already with root privileges. However if you forget the password and need to change it things become a...

How to install Cerberus Linux SubSystem

Download Steps Start Windows PowerShell in the Administrator Command Prompt by typing: Copy: powershell

Raspberry Pi 3 Model A+ and new Raspbian Linux release

The Raspberry Pi Foundation made two significant announcements Nov 2018. First, the availability of the Raspberry Pi 3 Model A+, which has been eagerly awaited; then, the next...

GTA 5 cheats – cars, bikes, helicopters, planes, codes

Sooner or later you're going to do something in GTA 5 that leaves you with a burning need for an escape vehicle. Thankfully, Rockstar has included plenty of cheat codes that let you...

HOW TO SCAN WHOLE INTERNET 3.7 BILLION IP ADDRESSES IN FEW MINUTES?

Cyber security audit and ethical hacking training professionals normally use scanner to scans the networks. Scanning every IP address on the internet isn’t an easy job, and if you...
Skip to toolbar