Showing posts from June, 2019
What power supply do you need for Raspberry PI 3

What power supply do you need for Raspberry PI 3

What you need to know about  Raspberry Pi 3   power supply Raspberry Pi 3 is not a very demanding computer. It works from just 5 volts a...
How to find ip behind cloudflare

How to find ip behind cloudflare

get real ip behind cloudflare
what to do After Installing Ubuntu 19.04

what to do After Installing Ubuntu 19.04

Things to do after installing ubuntu Things to do after installing ubuntu 19.04
Fix ubuntu software center is not working

Fix ubuntu software center is not working

ubuntu software center not installing
ubuntu install guest additions

ubuntu install guest additions

ubuntu guest additions
how to install ubuntu in virtualbox

how to install ubuntu in virtualbox

how to install ubuntu on virtualbox install ubuntu with virtualbox
how to use Ngrok with SocialFish V3

how to use Ngrok with SocialFish V3

socialfish with ngrok
Reset Kali Linux password

Reset Kali Linux password

how to reset kali linux password Very easy way on how to reset kali linux login password In this tutorial, you will see what to do i...
Termux tools & packages

Termux tools & packages

there is a multi way to install termux tools in this video we will use a script called lazymux that will speed up the processing   this...
CMSeek cms detector

CMSeek cms detector

CMSeek cms detector is used to identify cms website     cms detector
BlackEye phishing tool

BlackEye phishing tool

BlackEye Tool For phishing blackeye phishing tool
How to fix permissions denied in Linux

How to fix permissions denied in Linux

How to fix permissions denied Ubuntu,Linux Mint,Fedora
how to Install Termux On Android and fix permission denied
how to install java in Ubuntu

how to install java in Ubuntu

Java is a very popular programming language developed by Sun Micro systems. Now Java is used to create various desktop programs, web applic...
WPA2 Half Handshake attack

WPA2 Half Handshake attack

WPA2 Half Handshake (half handshake): WiFi password hacking software and attack scripts Each Client connection (Station) to a WiFi access ...
Hacking Wifi using PMKID and Aircrack-ng

Hacking Wifi using PMKID and Aircrack-ng

Hacking WiFi without users in Aircrack-ng About hacking WiFi, which are not connected to the clients, described in the previous article &...
Hacking WiFi without users using PMKID attack

Hacking WiFi without users using PMKID attack

Attack on WiFi without clients There are a large number of various attacks on WiFi . The most universal attack (working against virtually...
Selective jamming of WiFi networks and clients

Selective jamming of WiFi networks and clients

(DoS attack on individual access points / clients) Selective jamming of WiFi networks can be useful in different scenarios. For examp...
Basic Kali Linux Commands

Basic Kali Linux Commands

The Linux operating system is very popular with programmers and lovers of “poking around”, because it provides for the active use of the co...

Search

Popular Posts

USB WiFi adapters that support monitor mode and wireless injection

usb wifi adapter with monitor mode and wireless injection (100% compatibl…

how to update Kali Linux and Fix update error

Kali Linux one of the best Linux distro for penetration testing it's freq…

Fix Kali Linux sources.list Repositories

Fix default repository First after installing a clean Kali Linux the sou…

Recent Comments

Contact Me