windows

  1. The Evolution of Windows

  2. Windows 10 - Shortcuts Keys

  3. Windows Privilege Escalation: Kernel Exploit

    As this series was dedicated to Windows Privilege escalation thus I’m writing this Post to explain command practice for kernel-mode exploitation. Table of Content What is a kernel? Prerequisite Hunting Vulnerable Kernel Kernel Privilege Escalation Techniques Kernel Exploit Using Metasploit...
  4. File Transfer Cheatsheet: Windows and Linux

    File transfer is considered to be one of the most important steps involved in Post Exploitation. So, today in this article we are going to highlight the several techniques which can be used by the pentester to transfer files to the victim machine( Windows and Linux Machine) Table of Contents...
  5. How To Create a Password Protected Folder in Windows

    What is Password Protected Folder? When using Windows file explorer all the files are easily accessible by anyone who can use your computer.some of us share the same computer with our family or roommates or colleagues and sometimes we have some confidential data that we want no one to access...
  6. Blue Screen Error | Explained ...!!

  7. How to Install PuTTY on Windows

    Introduction PuTTY is an open-source SSH and Telnet client developed for Windows. This terminal emulator allows users to remotely connect to a computer to securely transfer files and manipulate data. In this tutorial, you will learn to install and configure PuTTY on Windows. Prerequisites...
  8. How to Ping Specific Port Number in Linux and Windows

    Introduction The ping command is a network tool for checking whether a remote system is up and running. In other words, the command determines if a certain IP address or a host are accessible. Ping uses a network layer protocol called Internet Control Message Protocol (ICMP) and is available on...
  9. How To Use Telnet On Windows

    Introduction Telnet (teletype network) is a network protocol for two-way text-based communication through a CLI, allowing remote access. Telnet is vulnerable to cybersecurity attacks because it lacks encryption methods compared to the more modern SSH. However, it is still helpful for tasks that...
  10. How to Run Windows Application and Games on Kali Linux

    There are so many users recently switched in Kali Linux from Windows, some of them and they want to run Windows programs and games in Kali Linux. So in our today's tutorial we will describe how to run Windows programs and games in Kali Linux. We can easily do this via wine. Wine is a program...
  11. Kali Linux For Configuring In Windows

    Kali Linux For Windows Kali Linux is the upgraded version of BackTrack Linux. It was first raised in 2012 with a total new architecture. This Debian-based Linux distribution with over 600 tools specialized for penetration testing and digital forensics. It is maintained and funded by Offensive...
  12. How to Reset Forgotten Password of any Windows

    In this digital forensic tutorial we are going to learn how to reset forgotten password of Windows 7 or Windows 8 or Windows 10. Using this forensic method we can unlock any Windows devices without knowing the user password and without formatting the hard disk. Suppose we work in a digital...
  13. How to create a keylogger in PowerShell ?

    The creation of a keylogger in PowerShell during the development of a Tarlogic Red Team exercise was necessary. And given the specific condition of the scenario, the best resulting option was programming a small script in PowerShell in order to save and exfiltrate keystrokes. Please, find in...
  14. Set a shutdown timer in windows without external software

    Set a shutdown timer in windows with no external software Open command prompt and type: shutdown -s -t XXXXX Where XXXXX is the number of seconds until shutdown (eg. 3600 for 1 hour). Can also be used to restart or force shutdown with -r and -f Great for downloading stuff over night or when...
  15. Windows Task Manager source code review by original author

    Windows Task Manager source code review by original author
  16. Rounded Corners in C# Windows Forms

    Rounded Corners in C# Windows Forms using System; using System.Windows.Forms; using System.Runtime.InteropServices; namespace WindowsFormsApplication1 { public partial class Form1 : Form { [DllImport("Gdi32.dll", EntryPoint = "CreateRoundRectRgn")] private static extern...
  17. Windows Server Administration for Beginners

    Windows Server Administration for Beginners To Watch The Course On YouTube
  18. Windows 7 : FULL TUTORIAL (Basics)

    Windows 7 : FULL TUTORIAL (Basics) To Watch The Course On YouTube
  19. Learn Windows 10, Windows 10 Tutorial Course

    Learn Windows 10, Windows 10 Tutorial Course To Watch The Course On YouTube
  20. Download Windows 10 Manager | Full

    Download Windows 10 Manager | Full Windows 10 Manager is a system utility that helps you optimize, tweak, repair and clean up Windows 10. It will increase your system speed, eliminate system fault, improve system security, and meet all of your expectations.Windows 10 Manager is a system...
Top