How to use VeraCrypt portable, Truecrypt replacement in windows 10 updated

VeraCrypt portable, Truecrypt replacement in windows 10

Yeah, if you are very serious about the data protection and you have learnt before about encrypt files and folders by EFS and bitlocker windows 10 encryption, then you can use the third party software like VeraCrypt it can create a encrypted container encrypted drive partition and also encrypt the whole operating system. This article will … Read more

How to install LibreOffice for Kali Linux Guide for beginners


Are you a regular user of Kali Linux? Do you want to install an office for Kali Linux? Kali Linux is an operating system used for penetration testing purposes only. So it doesn’t have office use tools like word, excel, powerpoint, etc. Microsoft word, excel and powerpoint are not available for Linux distributions. So you … Read more

How to install Metasploit in Kali Linux Complete Guide for Beginners 2021

How to use metasploit pro in Kali Linux

How to install Metasploit in Kali Linux for Security Testing Security is a big concern for an organization, So most of the companies are hiring Pentester or Ethical hacker to secure data of an organization. You can use Penetration testing tools and different types of techniques to find out vulnerabilities in websites, applications or databases. … Read more

How to Change Kali Linux IP Address by using Graphical Interface

6 steps to change Kali Linux IP address (Easy)

Easy Steps to change Kali Linux IP address When it comes to windows everything just comes too easy. I mean you gotta work for that too but the sense of accomplishment just ain’t there. When it comes to Linux, everything feels like an accomplishment. So now today folks I am gonna teach you how to … Read more

Router Password Cracker Tool – Hydra in Kali Linux Guide for beginners

how to use Router password cracker tool hydra

Hydra – A Router Password Cracker Tool Password! password!! password!! Password is a common security nowadays, you will find implemented everywhere, if you want to login on your account (Facebook Twitter LinkedIn etc), you will have to enter the correct username and password. There are other online services which is required username and password for getting … Read more

How to save Nmap output to file Example a Complete Guide


MODULE 5:- Scanning Network and Vulnerability Introduction of port Scanning – Penetration testing TCP IP header flags list Examples of Network Scanning for Live Host by Kali Linux important nmap commands in Kali Linux with Example Techniques of Nmap port scanner – Scanning Nmap Timing Templates – You should know Nmap options for Firewall IDS … Read more

10 best open port checker Or Scanner tools Guide for beginners

10 open port checker Or Scanner

Scenario of Port Scanning Much malicious software such as Trojan, Virus, Backdoor, Malware, etc are hidden in your computer, and they are using open ports for sending information and connection over TCP/IP to its owner (Hacker). Hackers gains access to your computer by using these ports. So you must know what are the open ports … Read more

wpscan Kali Linux Tutorial to check WordPress Vulnerabilities Full Guide

wpscan check versioin

Millions of Websites are running on WordPress CMS today, Is your website one of them? If Yes, Do you know about vulnerabilities exist on your website? Think Again!! Is your WordPress website is hackable? Check Again! Your WordPress website for vulnerabilities. Today’s topic is wpscan Kali Linux Tutorial to Scan WordPress Website for Known Vulnerability. … Read more