This Kali release is the first to include the Linux …
Read More »
November 5, 2024
Complete WSL AI Development Environment Guide: CUDA, Ollama, Docker & Stable Diffusion Setup
Setting up a powerful AI development environment in Windows Subsystem for Linux (WSL) has never been…
June 18, 2024
Please use the command line updater because updating via browser is disabled in your config.php error on NextCloud
Received error upon launching Docker NextCloud on my Unraid server. Update needed Please use the com…
March 5, 2024
Whispers: A Powerful Static Code Analysis Tool for Credential Detection
“My little birds are everywhere, even in the North, they whisper to me the strangest stories.&…
March 5, 2024
Enabling AMD GPU for Hashcat on Kali Linux: A Quick Guide
If you’ve encountered an issue where Hashcat initially only recognizes your CPU and not the GP…
March 5, 2024
Identifying harmful activity on your captured traffic
This Python script utilises Wireshark or TCPdump to analyse network traffic stored in a specified .p…
May 20, 2023
Nyxt: Hacker’s Dream Browser
In the ever-evolving digital landscape, the demand for specialized tools and platforms has grown exp…
May 19, 2023
Migrate Plex Server – Ubuntu
To migrate your Plex server to a new Ubuntu server, you can follow these steps: 1. Set up the new Ub…
May 19, 2023
Boot Ubuntu Server 22.04 LTS from USB SSD on Raspberry Pi 4
This is a guide for configuring Raspberry Pi4 to boot Ubuntu from external USB SSD drive instead of …
April 26, 2023
How to fix You can’t access this shared folder because your organization’s security policies block unauthenticated guest access error on Windows 11
If you have the following error on Windows 11 “You can’t access this shared folder becau…
June 11, 2022
Ubiquiti Dream Machine (UDM) – unable to connect to NBN
I don’t want the NBN ISP router running anymore and use Ubiquiti Dream Machine (UDM) instead. …
Recent Posts
-
Complete solution for online privacy with own private OpenSSH, OpenVPN and VNC server
Complete solution for online privacy with own private SSH, VPN …
Read More » -
Advanced Persistent Threat Activity Exploiting Managed Service Providers
-
Advantages disadvantages of using Proxy vs VPN vs TOR vs TOR and VPN together.
-
Enable VPN on Kali Linux – fix VPN grayed out problem
-
802.11 Recommended USB Wireless Cards for Kali Linux
802.11 Recommended USB Wireless Cards for Kali Linux This post …
Read More » -
Fixing dpkg: warning: ‘ldconfig’ not found in PATH or not executable error when installing packages.
-
How to add remove user (standard user/non-root) in Kali Linux?
-
Hacking QNX systems over QCONN
-
Generate WiFi IVS dump with makeivs-ng on Kali Linux
makeivs-ng is part of the aircrack-ng package and is used …
Read More » -
Crack a WEP key of an open network without user intervention with Wesside-ng
-
Identify USB Driver. Ubuntu, Debian, Mint, CentOS, Fedora & all Linux distro
-
Cracking WPA2 WPA with Hashcat in Kali Linux (BruteForce MASK based attack on Wifi passwords)
-
How to search exploits in metasploit?
Metasploit was created by H. D. Moore in 2003 as …
Read More » -
Automated Penetration Testing with APT2 Toolkit
-
Brute Force Attacks Conducted by Cyber Actors
-
HIDDEN COBRA – FASTCash Campaign targeting banks
-
Output your microphone to a remote computers speaker
Output your microphone to a remote computers speaker
Read More » -
SSH through host in the middle
-
Three different ways to duplicate installed packages in multiple machines in Linux
-
ssh to machine behind shared NAT
-
How to check Network Interface details in Linux