Skip to content

CyberPratibha

A free blog for information

  • Home
  • FREE COURSES+
    • Ethical Hacking Tutorial
    • Linux Tutorial for Beginners
    • Website Devlopment
    • WordPress Tutorial
  • Categories+
    • Linux+
      • Kali Linux+
        • Basics
        • Password Attack
      • Ubuntu 14.04
      • BackBox Linux
      • Fedora 20
    • Security Tools+
      • Metasploit Guide
      • Password Cracking
      • Stegnography
      • Wifi Password tools
    • Windows 10+
      • Tips and Tricks
      • News
  • Best VPN Offer+
    • 7 Best VPN Over All
    • 7 Best VPN for Windows 10
    • 7 Best VPN for Android
    • Best VPN for MAC
    • 7 Best VPN for Torrenting
    • Best VPN Offers 2022
    • Ultimate VPN Guide
Search

CyberPratibha

A free blog for information

Close menu
  • Home
  • FREE COURSES+
    • Ethical Hacking Tutorial
    • Linux Tutorial for Beginners
    • Website Devlopment
    • WordPress Tutorial
  • Categories+
    • Linux+
      • Kali Linux+
        • Basics
        • Password Attack
      • Ubuntu 14.04
      • BackBox Linux
      • Fedora 20
    • Security Tools+
      • Metasploit Guide
      • Password Cracking
      • Stegnography
      • Wifi Password tools
    • Windows 10+
      • Tips and Tricks
      • News
  • Best VPN Offer+
    • 7 Best VPN Over All
    • 7 Best VPN for Windows 10
    • 7 Best VPN for Android
    • Best VPN for MAC
    • 7 Best VPN for Torrenting
    • Best VPN Offers 2022
    • Ultimate VPN Guide

CyberPratibha

A free blog for information

Search Toggle menu

Category: Penetration Testing

sql-injection part 1
July 19, 2014April 30, 2019Web Penetration Testing, Web Security

Manual SQL Injection By The Help of Firebug

Mutillidae: Manual SQL Injection By The Help of Firebug Web Penetration Testing: Part 3 What is SQL Injection? SQL Injection is a […]

June 12, 2014April 30, 2019Building Virtual Labs, Windows 10

Installing VirtualBox on Microsoft Windows 7 & 8

Open the following link in web browser and make sure you typed exact similar as given. Link: https://www.virtualbox.org/wiki/Downloads select correct version according your Operating […]

June 10, 2014April 30, 2019Basics, Exploitation, Linux

How to Configure Wireless Cards In Linux

Configuring the wireless card can be accomplished using Graphical mode described before during the GUI configuration of the Network card. In This […]

Posts navigation

< 1 2
course details

FREE Upcoming Training

  • Website Development Without Coding
  • RHCSA RedHat Server Administrator
  • Kali Linux Tutorial (Hacking Operating System)
  • Ethical Hacking Tutorial
  • Ubuntu Linux Tutorial

Subscribe Our Channel

Recent Posts

  • Take Your Kali Linux Experience to the Next Level: Adding Repositories Made Easy
  • Revamp Your Cybersecurity Arsenal: A Step-by-Step Guide on Updating Kali Linux
  • Join the Dark Side of WiFi Hacking: Our Top 5 Tools to Boost Your Skills
  • Mastering Kali Linux Commands: The Ultimate Guide 2023
  • A Guide on How to Not Transfer Photos to New iPhone

Hacking Tools

TOP Free Hacking Tools 

Top 5 Wifi Hacking software 

Top 5 hidden spy apps for android and Iphone

Top10 Free Steganography Tools

Ethical Hacking Tutorial – Free

    Protect your Privacy

    Top 7 Best VPN 2022

    7 Best VPN for Windows

    7 Best VPN for Android

    Best VPN for MAC

    7 Best VPN for Torrenting

    VPN Offers March 2022

    Website Development

    Develop a Website for Small Business

    How to Start a Blog and Make Money

    How To Start Online Business

    Inexpensive & Reliable WordPress Hosting

    Best Web Hosting For Small Business

      Ethical Hacking Important

      Ethical Hacking Career in India

      Why Pursue a Career in Ethical Hacking

      How to Become Hacker Free

      How to become Kali Linux Hacker

      How do you access the Dark Web Safely

        © 2023 CyberPratibha. Proudly powered by Sydney

        WhatsApp us

        Exit mobile version