- Linux File Search Made EasyLinux surely may look little overwhelming if coming from a Windows or Mac. However in this post I will show some command based as well a GUI interface to search your files easily. I won’t bloat the post with too many commands but the necessary ones which will make your life and experience easier while… Read more: Linux File Search Made Easy
- Nmap Ninja! – Part 1 BeginnerHello world, in this tutorial I am going to demonstrate how you can recon your network using open source software “Nmap”. This is the deepest beginners guide for Nmap you can find on the internet. However in the Part 2, I will introduce you to more advanced techniques helpful in pen-testing. What is Nmap?Nmap is… Read more: Nmap Ninja! – Part 1 Beginner
- The Top 99 Sci fi Novels of all TimeHello World, In the midst of the Corona Virus, most of the nations have locked down itself. I pray to the Lord to cure this outbreak. These days are boring and there is nothing one can do except stay at home, watch TV, internet and nerds like me find it as the best time to… Read more: The Top 99 Sci fi Novels of all Time
- Fix – Internet Connected but cannot browse websites on Windows 10Hello World, I hope everyone is doing well. Recently I had an issue with the internet where I was connected to the WIFI however unable to connect to any website. This is a weird problem with many laptops running Windows 7 and 10 with a few network cards. I tried pinging google which was totally… Read more: Fix – Internet Connected but cannot browse websites on Windows 10
- Fern WiFi Cracker – WiFi Cracking For NoobsFern WiFi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or ethernet based networks. Fern Wifi Cracker supports the following features:a) WEP… Read more: Fern WiFi Cracker – WiFi Cracking For Noobs
- Satellite Orbit Tracking with GpredictWhat is Gpredict?Gpredict is a real-time satellite tracking and orbit prediction program. A satellite tracking program is a computer program that predicts the position and velocity of a satellite at a given time, using a mathematical model of the orbit. Once the position and velocity of the satellite is known, other data can be calculated,… Read more: Satellite Orbit Tracking with Gpredict
- Cewl – The Custom Word-List GeneratorTable of Contents What are word-lists? What is Cewl? How to install Cewl? How to use Cewl? Author Notes What are word-lists?A word-list is a text file containing a collection of words for use in a dictionary attack. If you have a large number of target accounts, a small word-list will give you the fastest… Read more: Cewl – The Custom Word-List Generator
- 3 Easy Ways to Exploit MySQL LoginIn this read, I will like to discuss 3 easy ways which can help you take control of victim’s MySQL login credentials. What the Heck is password cracking? Password cracking refers to various measures used to discover computer passwords. This is usually accomplished by recovering passwords from data stored in, or transported from, a computer… Read more: 3 Easy Ways to Exploit MySQL Login
- Beginner’s Guide to Banner GrabbingWhat is Banner Grabbing? Banner grabbing is an activity that is used to determine information about services that are being run on a remote computer. This technique can be useful to administrators in cataloging their systems, and ethical hackers can also use it during penetration tests. Malicious hackers also use banner grabbing, since the technique… Read more: Beginner’s Guide to Banner Grabbing
- Domain Scrapping with theHarvesterWith the right information in hands, organizations may use the information to obtain a competitive advantage against their rivals. It can also be used to help or speed up investigations within an organization due to intellectual property theft. The correct use of OSINT tools like ‘theHarvester’ organizations can: – a) Increase conversion rates and make… Read more: Domain Scrapping with theHarvester
- Twitter Mining Using TwintSocial media for reconnaissance is a prime way for attackers and researchers. Social media websites like Twitter offer vast, searchable databases updated in real-time by millions of users, but it can be incredibly time-consuming to manually search data.Twint is an OSINT crawler that can dig deep and meaningful information out of Twitter. Twitter also contains… Read more: Twitter Mining Using Twint
- ReconDog V2 – Kali LinuxWhat is ReconDog? Recon Dog is an all in one Swiss tool for all your basic reconnaissance needs. It makes use of various APIs to gather all the information so your identity is not revealed to others. In addition to recon, ReconDog is a honeypot detector, subdomain enumerator and cms detector. Official GitHub Link ->… Read more: ReconDog V2 – Kali Linux
- The Definitive Parrot Security OS Install Guide On Virtual MachineWhat is Parrot Os?Parrot Security OS is an open-source and free GNU/LINUX distribution that is made for developers, security researchers, forensic investigators, data scientists, and privacy-aware people. It is based on Debian and uses MATE as a default desktop environment. Also, available in KDE Plasma flavor. Parrot distribution is a rock solid system. Parrot is… Read more: The Definitive Parrot Security OS Install Guide On Virtual Machine
- vodoo666About the site Project Nirvana 2030 is inspired by my futuristic AI project. The AI is visioned to be launched in the year 2030. As my hobby I like to do reviews on social security tools, Linux distributions and pen-testing. In par to do this I also create security related content on YouTube. Why do… Read more: vodoo666
Follow My Blog
Get new content delivered directly to your inbox.