How to create a file in Linux – View, Edit by Terminal Command Guide

how to create a file in linux

How to create a file in Linux terminal In this post, you will learn about how to create a file in Linux by using commands in terminal. use Linux vi editor commands for Create, View and Edit files in Linux operating system. Linux is not like windows operating system and mostly it operated by commands. There … Read more

5 Nmap Timing Templates – You should know for scanning network

5 Nmap Timing Templates you should know

Nmap Timing Templates: Nmap timing has built with this ability to scan the target set faster or slower scanning speed than the normal or default speed. There are number of different settings can be selected based of timing templates. #nmap –sU –T# -p1-100 {Target_IP_Address} Or #nmap –sU –timing paranoid –p1-100 {Target_IP_Address} -T0 Paranoid  This Type of … Read more

How to Update Kali Linux 2021.2 by Using Single Command


A new version of Kali Linux has been released on 1 June 2021 with new attractive tools and bug fixes. The major release of Kali Linux version 2021 and minor is Kali Linux 2021.2. It is available for immediate download. Changelog of Kali Linux is available here Non-Root Kali Linux: This is the first … Read more

How to install Kali Linux on VirtualBox 2021.2 [UPDATED]


Are you a beginner in Kali Linux? And don’t know how to install Kali Linux on Virtualbox / hard drive. Don’t worry, you are the right place. I will guide you. Today I am going to share with you “How to install Kali Linux on VirtualBox”. Kali Linux on VirtualBox is the best option to set up … Read more

How to create hotspot in Windows 10 – Full Guide for beginners 2021

How to create hotspot in Windows 10

How to create hotspot in Windows 10 laptop WiFi When your laptop is connected with a wired adapter and Internet active only on your laptop and you want to share the Internet connection by laptop to other devices like mobile or laptop. In this case, you can create Hotspot and share the Internet connection with … Read more

MSFvenom replacement of MSFpayload and msfencode Guide for Beginners

MSFvenom replacement of MSFpayload and msfencode image

Hello and welcome on my blog, I am reaching you with latest and knowledgeable post. As you know msfpayload was used to create payloads ( general called trojan /backdoor ) and msfencode was used to encode payloads for avoiding antivirus detection. you can read in my old post Creating Trojan Horse (Encoded)By Using Msfpayload but both … Read more

Learn about macchanger or MAC spoofing in Windows 10 & Linux complete guide

mac spoofing

In this article you will learn how to change mac address by MAC spoofing in Windows and Linux (ubuntu and Kali Linux ) manually and by macchanger software. Scenario about MAC spoofing MAC address is the unique identification of computers all over the world, and every device has been identified by its physical address in … Read more

Basics of Metasploit Modules in Kali Linux Guide for beginners 2021

metasploit modules types and explanation in Kali Linux

Metasploit Modules in Kali Linux Metasploit modules are main components of  Metasploit. The Metasploit Project is a computer security extend that gives data about security vulnerabilities and supports in penetration testing. The Framework breaks down into the module sorts: Metasploit Exploits Modules Auxiliary Modules Metasploit payload Modules Listeners Metasploit modules Shellcode Encoders Nops 1. Metasploit … Read more

How to use whois Kali Linux commands with example 2021

whois Kali Linux commands

Overview of Whois Kali Linux command A whois Kali linux command is a utility as a part of the information gathering used in all of the Linux-based operating systems. this tool is part of information security assessment, and one of  information gathering techniques.  there are a lot of  information gathering strategies. It is used to identify domain information … Read more

how to use theharvester an email harvesting tool in Kali Linux


Theharvester in Kali Linux Description: theHarvester is a tool for gathering e-mail accounts, subdomain names, virtual hosts, open ports/ banners, and employee names from different public sources (search engines, pgp key servers). It is a really simple tool, but very effective for the early stages of a penetration test or just to know the visibility … Read more