DDOS Attack

STEP 1 Open Terminal in Kali Linux. Type following command to create and open new Directory STEP 2 Skip this step if you are using Kali Linux. STEP 3 Clone GoldenEye Source code from GitHub. It will download all Source code in your device. STEP 4 It will create a new Directory so let’s open …

DDOS Attack Read More »

Linux Privilege Escalation

Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.

CMD Commands For Your Windows

To Open CMD, you need to search for CMD in the Search box or you can simply press Windows Key + R that will eventually open the Run window, where you need to type CMD and hit enter.  1. Accessibility Controls – access.cpl  2. Accessibility Wizard – accwiz  3. Add Hardware Wizard – hdwwiz.cpl  4. …

CMD Commands For Your Windows Read More »

Basic Termux Commands

Termux is a Powerful Android app which is Designed to Install Linux packages on your Android Mobile With this Termux App You Can Install shell, python, c, c++, perl, ruby, java and many more useful packages and with the help of Termux we can use several Hacking Tools/scripts in our mobile including Nmap, Hydra, Sqlmap etc.. …

Basic Termux Commands Read More »

Ethical Hacking Course

**The Complete Ethical Hacking Course** Are you a beginner? And want to become a Penetration Tester?, But don’t know fromwhere to start?… Don’t worry this course is going to help you. Learn Ethical Hacking from beginner to advanced.

How To Create Your Own USB Stealer?

USBStealer is a Windows Based Password Hacker Tool that helps to Extract the password from Windows-Based Applications such as Chrome Password, FireFox Password, NetPassword, Admin passwords of the Windows Computer.

Scroll to Top