If you follow the Ubuntu development process closely, you must be knowing about the Ubuntu Communitheme that has been under development for some...
USB Drives are the most convenient go-to devices nowadays when the need to prepare a Bootable media arises. For a reason being...
Aircrack-ng is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security: Monitoring: Packet...
On July 16th, 1993, Slackware Linux distribution was officially released. Based entirely on the Softlanding Linux System (SLS) system, it was designed...
Following the fourth point release of Debian 9 “stretch” in March, the developers of the popular GNU/Linux distro have shipped the latest...
A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu Web Pentest | Banner Grab | Whois | Traceroute...
Another sign that the user-controlled software repository should not be fully trusted One of the most popular Linux distros, Arch Linux, has...
Exploiting vulnerable/misconfigured Firebase databases Prerequisites Non-standard python modules: dnsdumpster bs4 requests Installation If the following commands run successfully, you are ready to...
This is a simple tool to gather information, based on Operative-Framework. Requirements requests pythonwhois beautifulsoup4 Install requirements $ pip install -r requirements.txt...
Arch Linux software repository named Arch User Repository (AUR) has been infected by malware. As many as three Arch Linux packages available...
There’s no doubt that Linux and Mac are more secure operating system choices as opposed to Microsoft Windows. But this doesn’t mean...
The Raspberry Pi Foundation keeps updating its Debian-based Raspbian operating system from time to time. The developers keep adding new features to...
SUSE Linux, the open source software company owned by the British company Micro Focus International, was sold to a Swedish private equity...
Python script for trying default passwords for some TP-Link Hotspots Inspired by Usage usage: scan.py [-h] [-p] Python script for trying default...
We often watch experts in movies using forensic tools for their investigations but what cyber forensic tools are used by experts? Well,...
The ownership SUSE is getting transferred from UK-based Micro Focus International to Sweden’s investment firm EQT VIII. The deal, which is yet to...
Soon after the Linux Mint team started shipping the MintBox Mini 2, they released Linux Mint 19 “Tara,” the most recent and...
Data breaches are always bad news, and this is peculiarly bad. Gentoo, a popular Linux distribution (or distro), has suffered the hacking of its...
The Rogue Toolkit is an extensible toolkit aimed at providing penetration testers an easy-to-use platform to deploy software-defined Access Points (AP)...
Gentoo Linux holds the reputation of being a “build it yourself” distribution; it needs you to download the source code from the...
SubFinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular...