Showing posts from 2016
Top Hacking Books

Top Hacking Books

There is Growing demand for computer experts who can perform ethical hacking work due to the increased use of the Internet. However, it is...
Raspbian Wheezy Static / fixed IPv4 address

Raspbian Wheezy Static / fixed IPv4 address

Raspberry Pi: Static / fixed IPv4 address for Raspbian Wheezy Static IPv4 address for Raspbian Jessie (Raspberry Pi) If you are usin...
how to hack wifi password

how to hack wifi password

how to hack wifi password kali linux tutorial  recently, most "noob" are looking for an easy wireless networks hacking WiFi, P...
Generate Geolocation map using WireShark

Generate Geolocation map using WireShark

How to use Maxmind GeoLite database to generate a Geo-location map ... example made on Linux ( Kali linux 2016.2 ) ... it will work the...
Top 10 Programming Languages

Top 10 Programming Languages

Programming language rankings TOP-10 2016 latest comparison top 10 programming languages One of the most asked question those days is...
Intercepter-NG

Intercepter-NG

Intercepter-NG Intercepter-NG v2.0 is an Android penetration testing app. by using Intercepter-NG you will be able to intercept and ana...
jSQL Injection

jSQL Injection

JSQL injection Tool SQL injection refers to an injection attack in which the attacker adds malicious SQL statements to a Web form inp...
diamond 980000N usb Wifi Adapter

diamond 980000N usb Wifi Adapter

Diamond 980000N High Power Wireless Adapter USB Wifi lan card Diamond 980000N High Gain Powerful 38DBI 3800mw is using  ralink wireles...
Linux Command Line Cheat Sheet

Linux Command Line Cheat Sheet

The most essential Linux commands Keep this Linux cheat sheet on your desk printed, it will help you to learn them quick and become a ...
Fix This kernel requires an x86-64 CPU detected an i686 CPU

Fix This kernel requires an x86-64 CPU detected an i686 CPU

This kernel requires an x86-64 CPU, but only detected an i686 CPU. Trying to install kali linux or ubuntu on Oracle VirtualBox or VMware...
What is Darknet & How to Access it

What is Darknet & How to Access it

Darknet A Darknet is an overlay network that can only be accessed with specific software, configurations, or authorization, often using no...
aceVoip

aceVoip

ACE VoIP Directory Tool ACE (Automated Corporate Enumerator) is a simple yet powerful VoIP Corporate Directory enumeration tool that mimi...
acccheck

acccheck

accc heck Package Description Acccheck Attempts to connect to the IPC and ADMIN shares depending on which flags have been chosen, an...
Kali rolling 2016

Kali rolling 2016

Offensive Security has announced on January 21, 2016, that their popular penetration testing operating system, Kali Linux, is getting a rol...
aNmap  Android Network Scanner

aNmap Android Network Scanner

Nmap is one of the most important tools for every Network security Nmap it's the best  network security scanner tool over the last 10 ...
 infernal twin Automated Evil Twin Attack

infernal twin Automated Evil Twin Attack

Automated Evil Twin Attack: infernal-twin Evil twin is a term for a fake WiFi access point, it appears to be a legitimate one offered on t...

Search

Popular Posts

USB WiFi adapters that support monitor mode and wireless injection

usb wifi adapter with monitor mode and wireless injection (100% compatibl…

how to update Kali Linux and Fix update error

Kali Linux one of the best Linux distro for penetration testing it's freq…

Fix Kali Linux sources.list Repositories

Fix default repository First after installing a clean Kali Linux the sou…

Recent Comments

Contact Me