How to Turn an Android Phone into a Hacking Device Without Root

With just a few taps, an Android phone can be weaponized into a covert hacking device capable of running tools such as Nmap, Nikto, and Netcat — all without rooting the device.

Build a Beginner Hacking Kit with the Raspberry Pi 3 Model B+

If you want to follow Our tutorials and try out Kali Linux, the Raspberry Pi is a perfect way to start. In 2018, the Raspberry Pi 3 Model B+ was released featuring a better...

20 Linux Command Tips and Tricks That Will Save You A Lot of Time

You might already know a few of these Linux command tips or perhaps all of it. In either case, you are welcome to share your favorite tricks in the comment section. Some...

How To Reset Root User Password In CentOS/RHEL 7

Normally resetting the root password is a simple task if you’re logged in already with root privileges. However if you forget the password and need to change it things become a...

How to install Cerberus Linux SubSystem

Download Steps Start Windows PowerShell in the Administrator Command Prompt by typing: Copy: powershell

HOW TO SCAN WHOLE INTERNET 3.7 BILLION IP ADDRESSES IN FEW MINUTES?

Cyber security audit and ethical hacking training professionals normally use scanner to scans the networks. Scanning every IP address on the internet isn’t an easy job, and if you...

Raspberry Pi 3 Model A+ and new Raspbian Linux release

The Raspberry Pi Foundation made two significant announcements Nov 2018. First, the availability of the Raspberry Pi 3 Model A+, which has been eagerly awaited; then, the next...

How to Do a MitM Attack with Websploit

I assume most of you know what a Man in the Middle (MitM) attack is, but here is a diagram of a Man in the Middle attack. I...

How To Speed Up Linux

Ubuntu is very powerful and polished Debian based Linux distro. Though Ubuntu Desktop Performance is remarkably good and fast on modern laptop and desktop. But after a few...

Best Hacking Tools For Linux

Here are the best software that will work on your Linux OS and then you can also create a virtual dummy network to perform various hacks. So have a look on...
Skip to toolbar