Build the Ultimate Hacking Machine: Kali Linux on WSLTurn Your Windows PC into a Pentester’s Dream MachineJan 14Jan 14
Say goodbye to Dual-boot. Embrace Linux on Windows with WSLOne such strong these days is Windows Subsystem for Linux (WSL), which helps you to set up a full Linux distribution on Windows, without…Nov 19, 2024Nov 19, 2024
How to set up AWS account for hosting Web Applications.Today we are going to set up AWS for web application hosting and we are gonna use Ubuntu as the OS.Jun 15, 2024Jun 15, 2024
Your AI Assistant Awaits: A Guide to Setting Up Your Own Private GPT and other AI ModelsNew AI models are emerging every day. There are numerous models that are pre-trained, open source, and readily available for download. Why…Mar 23, 2024Mar 23, 2024
Unlocking Secure Connections: A Guide to Setting Up Your Own Private VPN for FREE[Pt.1]A Virtual Private Network (VPN) serves as a secure tunnel between your device and the internet, encrypting your online data and protecting…Mar 17, 2024Mar 17, 2024
Cloud Security Auditing with ProwlerProwler is an Open Source security tool to perform AWS, Azure and Google Cloud security best practices assessments, audits, incident…Feb 28, 2024Feb 28, 2024
Cast Your Net: Setting Up Phishing Campaign with ease [Pt.1]So Phishing, we all know what that is.Feb 24, 20241Feb 24, 20241
How to use WEAK passwords STRONGLYWe all understand the importance of a ‘STRONG PASSWORD.’ The cyber world is evolving at a rapid pace, and so are the hackers. We’ve shared…Feb 12, 20241Feb 12, 20241
Network & Application PentestingIn this article, we gonna look into difference between Network and Application Penetration Testing.Oct 24, 2023Oct 24, 2023
TryHackMe Slingshot v1 WriteupThis is my experience with THM room SlingshotOct 17, 20232Oct 17, 20232