Pentesting and programming with a bootable USB-Kali Linux

Hello my first Tutorial will be on how to make a bootable usb kali linux from where you can do pentesting (programming or vulnerablity analysis) with every computer just with a...
C language programming coding

Coding in C and C++

Hello today I will explain to you guys a few things about coding and how to think when you want to learn a language like C or C++! What you want to...
jailbreak IOS

Cydia-Jailbreak For IOS

What's a Jailbreak? What is Jailbreaking? Technical Definition of Jailbreak: The iPhone, iPod touch, iPad & Apple TV hack that allow users to gain access to the entire Unix filesystem. In Unix terms, this...
Wifite exemple

wifite

INTRODUCTION Wifite is an automated wifi cracking tool using the most popular and used cracking tools script (like reaver, airplay-ng and so on...) The use of wifite is pretty easy because it is...
nikto exemple

What is nikto, how to use it?

Description of Nikto : Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated...
aircrack-ng finding passwords

aircrack-ng

Description: Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations...
Airdump exemple

airodump-ng

Description: Airodump-ng is a network scanning and auditting tool while it can capture files to be, after analysed with wireshark. Installation: It is part of the group of the subtools of the aircrack-ng script...
Armitage exemple

Armitage

metasploit-logo

Metasploit

Metasploit Unleashed Hardware Requirements All values listed are estimated or recommended. You can get away with less although performance will suffer. Hard Drive Space You will need to have at minimum 10 gigabytes of...
Matrix green numbers

what’s the Matrix?

Matrix   Matrix is an open protocol for real-time communication. It is designed to allow users with accounts at one communications service provider to communicate with users of a different service provider via...