Skip to content

CyberPratibha

A free blog for information

  • Home
  • FREE COURSES
    • Ethical Hacking Tutorial
    • Linux Tutorial for Beginners
    • Website Devlopment
    • WordPress Tutorial
  • Categories
    • Linux
      • Kali Linux
        • Basics
        • Password Attack
      • Ubuntu 14.04
      • BackBox Linux
      • Fedora 20
    • Security Tools
      • Metasploit Guide
      • Password Cracking
      • Stegnography
      • Wifi Password tools
    • Windows 10
      • Tips and Tricks
      • News
  • Best VPN Offer
    • 7 Best VPN Over All
    • 7 Best VPN for Windows 10
    • 7 Best VPN for Android
    • Best VPN for MAC
    • 7 Best VPN for Torrenting
    • Best VPN Offers 2022
    • Ultimate VPN Guide

CyberPratibha

A free blog for information

  • Home
  • FREE COURSES
    • Ethical Hacking Tutorial
    • Linux Tutorial for Beginners
    • Website Devlopment
    • WordPress Tutorial
  • Categories
    • Linux
      • Kali Linux
        • Basics
        • Password Attack
      • Ubuntu 14.04
      • BackBox Linux
      • Fedora 20
    • Security Tools
      • Metasploit Guide
      • Password Cracking
      • Stegnography
      • Wifi Password tools
    • Windows 10
      • Tips and Tricks
      • News
  • Best VPN Offer
    • 7 Best VPN Over All
    • 7 Best VPN for Windows 10
    • 7 Best VPN for Android
    • Best VPN for MAC
    • 7 Best VPN for Torrenting
    • Best VPN Offers 2022
    • Ultimate VPN Guide

CyberPratibha

A free blog for information

Author: Gaurav Mahajan

I am Gaurav Mahajan a blogger, songwriter, code learner, tech enthusiast, food inhaler and overall a nice lazy guy that just loves tech of all forms
how to use Kali Linux
June 5, 2016April 30, 2019module 3 Basic of Kali

20 basics about how to use Kali Linux

MODULE 3:- Basics of Kali Linux Install Kali Linux on Hard drive […]

January 6, 2016News

The first JavaScript powered RansomWare Ransom32

Ransomware: What is it? Let’s go by the wiki definition with this […]

January 5, 2016July 20, 2016News, Web Security

World’s first Power outage using Malware

Die Hard 4.0 seems real enough now as we have the world’s first power […]

January 4, 2016January 4, 2016News

Mark Zuckerberg to become Iron Man without the armor

    When you hear this for the first time you can’t […]

December 31, 2015July 12, 2016News, Windows 10

Top 7 tech news stories of 2015

  The ending of 2015 has come. This year pushed everything to […]

December 31, 2015April 30, 2019News

After twitter, Microsoft to inform you if you are being spied on by the government

Few days ago we reported that twitter is informing the people if […]

December 31, 2015April 30, 2019News

Ian Murdock, Founder of Debian Linux, dies at 42

A star of programming has fell. And the programming sky is a […]

December 29, 2015News

Misconfigured Database exposes 191 million US voters

This just in, the misconfigured database  puts the Voters’ personal Info for […]

December 29, 2015April 30, 2019News

Attempt to bribe the Raspberry Pi, to pre- install a malware

  Remember when we were all hopeful in the article discussing how […]

December 27, 2015April 30, 2019News, Uncategorized

Celebrities Email accounts get hacked, exposing scripts and sex tapes

After the event that shake and moved all…The fappening. It seems the […]

Posts navigation

Previous 1 2 3 … 7 Next
course details

FREE Upcoming Training

  • Website Development Without Coding
  • RHCSA RedHat Server Administrator
  • Kali Linux Tutorial (Hacking Operating System)
  • Ethical Hacking Tutorial
  • Ubuntu Linux Tutorial

Subscribe Our Channel

Recent Posts

  • Kali Linux System Requirements for Laptop A Complete Guide for beginner
  • Basics of Metasploit Modules in Kali Linux Guide for beginners 2022
  • Top 9 Google Hacking Techniques 2022
  • How to use VeraCrypt portable, Truecrypt replacement in windows 10
  • 5 Nmap Scripts Examples in Kali Linux Tutorial for Beginners 2022

Hacking Tools

TOP Free Hacking Tools 

Top 5 Wifi Hacking software 

Top 5 hidden spy apps for android and Iphone

Top10 Free Steganography Tools

Ethical Hacking Tutorial – Free

    Protect your Privacy

    Top 7 Best VPN 2022

    7 Best VPN for Windows

    7 Best VPN for Android

    Best VPN for MAC

    7 Best VPN for Torrenting

    VPN Offers March 2022

    Website Development

    Develop a Website for Small Business

    How to Start a Blog and Make Money

    How To Start Online Business

    Inexpensive & Reliable WordPress Hosting

    Best Web Hosting For Small Business

      Ethical Hacking Important

      Ethical Hacking Career in India

      Why Pursue a Career in Ethical Hacking

      How to Become Hacker Free

      How to become Kali Linux Hacker

      How do you access the Dark Web Safely

        © 2022 CyberPratibha. Proudly powered by Sydney

        WhatsApp us

        Go to mobile version