Tags Linux
Tag: Linux
How to turn Android Phone into Hacking Machine without Root
Your Android phone can turn into a hacking device with only a few steps, being able to run tools like Nmap, Nikto, Netcat, and...
Enumy – Linux Post Exploitation Privilege Escalation Enumeration Tool
Enumy is an ultra fast portable executable that you simply drop on target Linux machine during a pentest or CTF...
Kali Linux 2020.2 Release – Penetration Testing and Ethical Hacking Linux Distribution
Kali Linux has just released new edition of their penetration testing and ethical hacking linux distribution i.e. Kali Linux 2020.1.2
A fast overview of what’s...
Thoron Framework – Penetration Testing Tool To Generate Payloads for Linux TCP Attacks
Thoron Framework is a Linux post-exploitation framework penetration testing tool that exploit Linux tcp vulnerability to get shell-like connection. Thoron Framework is used to...
Kali Linux 2020.1 Release – Penetration Testing and Ethical Hacking Linux Distribution
Kali Linux releases 2020.1 to kick off first release of the decade. Available for immediate download.
The following is a brief feature summary for this...
Reconnaissance Information Gathering
Learn to hack with our video tutorial collection (totally different from every other collection and programs on the market) with all the sensible demonstrations...