linux

  1. Linux Performance Tools

  2. Linux Path Structure

  3. How to Kill a Process in Linux with Kill, Pkill and Killall

    Introduction If a Linux process becomes unresponsive or is consuming too many resources, you may need to kill it. Most processes have their own methods of shutting down. Unfortunately, processes can malfunction and not allow themselves to be shut down. If a running background process is...
  4. Kali Linux 2022.1

    Kali Linux is an advanced penetration testing Linux distribution used for penetration testing, ethical hacking and network security assessments. Official images hosted by us for faster downloads. Download Kali Linux 2022.1 Kali Linux is preinstalled with over 600 penetration-testing...
  5. Linux Privilege Escalation: Automated Script

    In this article, we will shed light on some of the automated scripts that can be used to perform Post Exploitation and Enumeration after getting initial accesses on Linux based Devices. Table of Content Introduction Privilege Escalation Vectors Getting Access to Linux Machine LinPEAS LinEnum...
  6. File Transfer Cheatsheet: Windows and Linux

    File transfer is considered to be one of the most important steps involved in Post Exploitation. So, today in this article we are going to highlight the several techniques which can be used by the pentester to transfer files to the victim machine( Windows and Linux Machine) Table of Contents...
  7. How To Create Simple And Password Protected ZIP File in Linux

    Creating a ZIP archive helps keep things organized and makes it simple to transfer files from one device to another or upload them to the internet. Best of all, its powerful compression has a positive effect on the size – it shrinks without sacrificing data or quality after you extract it...
  8. linux Path Cheat Sheet

  9. How to install and start Packet Tracer in Ubuntu

    This tutorial explains how to install Packet Tracer 8.0.0 and previous versions on Ubuntu Linux. Learn installation steps of Packet Tracer on Ubuntu through screenshots. Packet Tracer is a network simulator software. It allows us to simulate all essential networking devices that are tested in...
  10. How to Set Up a Firewall with UFW on Ubuntu

    Introduction The first step in securing your system is configuring a firewall. To set up and manage your firewall, Linux has designed iptables, a flexible firewall utility. Users who are new to network security may find iptables a bit intimidating. That’s why we recommend starting with UFW. UFW...
  11. What is chroot jail and How to Use it ?

    Introduction The term chroot jail dates all the way back to 1992 and is frequently used today. But what does this term mean, and what is this operation used for ? In this tutorial, we will cover the basics of using chroot jails and show you how you can set one up. Prerequisites A system...
  12. How to List Running Processes in Linux

    Introduction Each application you use or a command you run on your Linux system creates a process or task. As a system administrator, you will need to manage processes to ensure optimal system performance. In this tutorial, we will cover different Linux commands you can use to list and manage...
  13. How to Run Windows Application and Games on Kali Linux

    There are so many users recently switched in Kali Linux from Windows, some of them and they want to run Windows programs and games in Kali Linux. So in our today's tutorial we will describe how to run Windows programs and games in Kali Linux. We can easily do this via wine. Wine is a program...
  14. TempoMail - Command Line Temporary Email in Linux

    During penetration testing many times we need to register on websites and they send a lots of mails. Even sometime we don't want to share our original e-mail id. Then how we can hide ourself from website's eye? Well, there are tons of temporary or disposable mail services in market that...
  15. How to Install Kali Linux | A Total Guide to Install Kali Linux

    Kali Linux is a specialized Linux distribution focusing on penetration testers and digital forensic Kali Linux have many pre-installed tools for cyber security. So installing Kali Linux can be very useful, but how to install Kali Linux ? There are many ways to install Kali Linux even we can...
  16. MAC Changer - Change MAC Address

    MAC address is stands for Media Access Control Address. MAC address is an unique identifier assigned to a network interface controller (NIC). Basically it's a hardware id when we are connecting an Ethernet and Wi-fi. As we know that MAC address is unique that means every device have a MAC...
  17. TempoMail - Command Line Temporary Email in Linux

    During penetration testing many times we need to register on websites and they send a lots of mails. Even sometime we don't want to share our original e-mail id. Then how we can hide ourself from website's eye? Well, there are tons of temporary or disposable mail services in market that...
  18. How to Install Telegam and Signal on Linux

    WhatsApp is the most widely used messenger in the world. It has more than two billion active user base which is great. We have adopted WhatsApp in our life and we use this for our very personal works, like personal media shearing and chats. But recently WhatsApp have updated their privacy...
  19. Manipulating MAC and IP addresses with MICH in Linux

    You must be familiar with the term IP address. Just like your home has a mailing address in the same way any computer or device connected to the internet have a mailing address called the IP address and the distinctive address that identifies a NIC is called the Media Access Control (MAC)...
  20. Simple Random Password Generator - Command Line (LINUX)

    A brute-force attack is when all possible keys are checked against encrypted data until the right key is found. Brute-force attacks are extremely costly from a resource and time perspective because the attacker is exploiting vulnerabilities in the encryption by taking advantage of key length and...
Top