TeamViewer is used for remote control, desktop sharing, online meetings, …
Read More »
April 2, 2025
Netflix’s Chaos Monkey: Embracing Failure for Resilience
Netflix Chaos Monkey: Master system resilience by deliberately breaking things. Learn how this innov…
March 29, 2025
How to Install Unraid NAS: Complete Step-by-Step Guide for Beginners (2025)
Build your own powerful home server in 2025? Learn how to install Unraid NAS with our comprehensive …
March 27, 2025
Starter Guide on Hacking and Information Security: The Two Paths
The two distinct paths to mastering ethical hacking and cybersecurity: the easy "script kiddie" rout…
November 5, 2024
Complete WSL AI Development Environment Guide: CUDA, Ollama, Docker & Stable Diffusion Setup
Setting up a powerful AI development environment in Windows Subsystem for Linux (WSL) has never been…
June 18, 2024
Please use the command line updater because updating via browser is disabled in your config.php error on NextCloud
Received error upon launching Docker NextCloud on my Unraid server. Update needed Please use the com…
March 5, 2024
Whispers: A Powerful Static Code Analysis Tool for Credential Detection
“My little birds are everywhere, even in the North, they whisper to me the strangest stories.&…
March 5, 2024
Enabling AMD GPU for Hashcat on Kali Linux: A Quick Guide
If you’ve encountered an issue where Hashcat initially only recognizes your CPU and not the GP…
March 5, 2024
Identifying harmful activity on your captured traffic
This Python script utilises Wireshark or TCPdump to analyse network traffic stored in a specified .p…
May 20, 2023
Nyxt: Hacker’s Dream Browser
In the ever-evolving digital landscape, the demand for specialized tools and platforms has grown exp…
May 19, 2023
Migrate Plex Server – Ubuntu
To migrate your Plex server to a new Ubuntu server, you can follow these steps: 1. Set up the new Ub…
Recent Posts
A very detailed guide on how to setup VPN on Kali Linux and Ubuntu
Every day millions of people uses different VPN service providers …
Read More »Enable VPN on Kali Linux – fix VPN grayed out problem
Advantages disadvantages of using Proxy vs VPN vs TOR vs TOR and VPN together.
Free VPN providers of 2015
Setting up Damn Vulnerable Web Application (DVWA) – Pentesting Lab
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application …
Read More »Enable full gnome instead of gnome-fallback in Kali Linux
Fix sound mute in Kali Linux on boot
124 legal hacking websites to practice and learn
Introducing Kali Linux NetHunter and NetHunter supported devices
Featured: The Kali Linux NetHunter project is the first Open …
Read More »Panama Papers data leak exposes Worlds largest global corruption
Setup honeypot in Kali Linux
How to Prevent DOM-based Cross-site Scripting
Bypass Web Application Firewall using WAFNinja
WAFNinja is a CLI python tool that helps penetration testers …
Read More »dns2proxy – Offensive DNS server post-explotation tool – DNS spoofing, phishing and pharming
Free DoS Attack Tools
DoS website using slowhttptest in Kali Linux – slowloris, slow HTTP POST and slow Read attack in one tool
How to create a Bot Net legally? Put that in your ToS, that’s how!
Output your microphone to a remote computers speaker
Output your microphone to a remote computers speaker
Read More »SSH through host in the middle
Three different ways to duplicate installed packages in multiple machines in Linux
ssh to machine behind shared NAT
How to check Network Interface details in Linux