Cybersecurity Updates & Tools
Followed by 250k+ Followers
Facebook
Instagram
X
Youtube
Sign in
Home
Cyber security
OSINT
Linux
News
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Password recovery
Recover your password
your email
Search
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Home
Cyber security
OSINT
Linux
Linux
How to Use the Linux find Command to Locate Files Like a Pro
Linux
How to Check Open Ports in Linux Using netstat, ss, and lsof
Linux
How to Send POST Requests Using curl in Linux
Linux
What Does chmod 777 Mean in Linux
Linux
How to Undo and Redo in Vim or Vi
News
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Kali Linux Tutorials
Home
Tags
Kali linux
Tag: kali linux
Kali Linux
The Hackingsage/Hacktronian – A Pentesting Tool for Linux and Android
Febi
-
December 27, 2022
0
Kali Linux
Kali Linux 2022.4 : Penetration Testing and Ethical Hacking Linux Distribution
R K
-
December 24, 2022
0
Cyber security
Metasploit Framework – A Beginner’s Guide for Penetration Testing & Exploit...
Ravi Sankar
-
December 15, 2022
0
Kali Linux
Kali Linux 2021.3 Released for NetHunter Smartwatch and With New Hacking...
Linumonk
-
September 15, 2021
0
Kali Linux
Kali-Whoami : A Privacy Tool Developed To Keep You Anonymous On...
R K
-
July 20, 2021
0
Kali Linux
AWS Pen-Testing Laboratory : Pentesting Lab With A Kali Linux Instance...
R K
-
July 7, 2021
0
Kali Linux
Kali Linux 2020.4 : Penetration Testing and Ethical Hacking Linux Distribution
R K
-
November 20, 2020
0
Kali Linux
Kali Linux 2020.3 Release (ZSH, Win-Kex, HiDPI & Bluetooth Arsenal) –...
R K
-
August 21, 2020
0
Kali Linux
Wireless Penetration Testing Approach: Kali Linux and Raspberry Pi for Security...
Balaji N
-
August 16, 2020
0
Kali Linux
Quiver : A Meta-Tool for Kali Linux
R K
-
July 31, 2020
0
1
2
3
...
5
Page 2 of 5
APPLICATIONS
IngressNightmare-POCs : Understanding The Vulnerability Exploitation Flow
Varshini
-
March 28, 2025
pwnSpoof : Generates realistic spoofed log files for common web servers with customisable attack...
R K
-
January 12, 2022
magicRecon : A Powerful Shell Script To Maximize The Recon And Data Collection Process...
R K
-
June 17, 2021
Useful Bug Bounty And Security Related Write-ups : A Comprehensive Guide For Enthusiasts
Varshini
-
January 22, 2025
HOT NEWS
Redirector Installation – A Comprehensive Guide For Red Team Operations
Varshini
-
September 25, 2024
0
Pentesting Tools
Installing and configuring redirectors as part of your red team infrastructure. Follow these step-by-step instructions to deploy and optimize redirectors using tools like Filebeat...