Linux

Weeman: A Powerful Tool for WebPage Cloning

Learn how to create a phishing page using the Weeman tool. This step-by-step guide will help you understand the process of setting up a phishing page and launching a phishing attack. Increase your cybersecurity knowledge and protect yourself from online threats.

How to Change MAC Address on Linux

Learn how to change MAC address on your Linux system with this step-by-step guide. Troubleshoot network issues or protect your privacy by following these simple commands.

A Step-by-Step Guide to Installing and Using Nivistealer

Learn how to install and use Nivistealer, a powerful penetration testing tool available on GitHub. Follow our step-by-step guide to get started with Nivistealer and enhance your cybersecurity skills.

How to Enumerate WordPress Usernames

Learn how to enumerate WordPress usernames and protect your site from hacker attacks. Implement these steps to enhance your website security and prevent unauthorized access.

Guide to Installing and Using Routersploit

Learn how to install and use Routersploit, an open-source framework for identifying and exploiting vulnerabilities in routers. Enhance the security of your network and protect against cyber threats.

Email bomber without own mail

Email bomber are widely used to prank friends and target email addresses. The difficulty with this is that you will have to use your own email address for the email bomber, making it easy for the target to discover you.

Cloud is the best alternative to Ngrok

cloud is a bash script that can be used on termux and Linux. Usually, we used to use the ngrok tool to expose our localhost but now all browsers mark the ngrok link as a danger so no one opens the link we send.

Pastehakk Clipboard poisoning attack

In this post, we’ll discuss a clipboard poisoning attack. The tool we’ll use for it is called pastehakk, and it can be used on both Linux and Termux devices. It was entirely written in a shell application.

lazyaircrack Automated tool for WiFi hacking

This post will discuss the utility lazyaircrack, which can be used to hack wifi passwords and create a wifi jammer. It was created purely using shell programs.

Latest articles

Skip to content