Setup Proxychains in Linux
What is Proxychains?
Proxychains is a tool that forces any TCP connection made by any given application to go through proxies like TOR or any...
Reverse Shell Cheat Sheet
If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterward you’ll probably want an interactive shell.
If it’s not possible...
Gradient App: Internet’s new celebrity obsession
Adding to the slew of gender-swapping, an ageing app we have a new app in town, Gradient. The app changes you into a celebrity...
AI composes an Eurovision song
A song by the name "Blue Jeans and Bloody Tears" has been algorithmically generated by a deep learning cloud-based AI which was fed thousands...
Metasploit outside LAN
Downloading NGROK and setting up an account
Using it in msfvenom
Starting a listener
Setting up NGROK
Setting up ngrok is fairly simple.
Go to their...
Best Driver Updater Tools 2020:
Driver updater tools do exactly what you're probably thinking—they assist you update some or all of the device drivers installed in Windows for your...
Installing I2P Service
The I2P service is pretty simple to install, simply use the apt repository
Gather the binaries
$ sudo apt-add-repository ppa:i2p-maintainers/i2p
$ sudo apt-get update
$ sudo apt-get install...
Best Hacking Movies That You Should Watch Right Now
If you are a geek, a coder, or a hacker then you must be the one who likes movies based on hacking and coding. Such...
Best Hacking Documentaries That You Should Watch Right Now
In order to become an ethical hacker in the 21st century, you should know some coding laterally with good inspiration.
Crunch: Password Attacks
A crunch is a tool that is used to generate the wordlist, the wordlist is generated with all possible permutations and combinations, in which...