Posts

Image
Learn Basic C Programming Lecture 1 : What is Keyword in c ? What is Datatype in c ? Check My YouTube channel For detail information. https://youtu.be/9VCK1iqn37E Subscribe My channel , Like and Comment Please.

11 AWESOME LINUX TERMINAL TRICKS

Image
Here are some great Linux terminal tips and tricks, each one is awesome. ALL WORK AND NO PLAY.. Linux is one of the most astoundingly functional and utilitarian Operating System around when it comes to working from the command line. Need to perform a particular task? Odds are there is an application or script you can use to get it done. Right from the terminal. but, as they say in the good book, "all work and play make jack really bored or something. "so here is a collection of my favourite pointless, stupid, annoying or amazing things that you can do right in your Linux Terminal. GIVE THE  TERMINAL AN ATTITUDE step 1> Type "sudo visudo". step 2> At the bottom of the "Defaults" (near the top of the file)add, on a new line, "Defaults insults". step 3> Save the file. "What did I just do to my Computer? "you may be asking yourself. Something wonderful. Now whenever you issue a command and m...

12 Best Operating Systems For Ethical Hacking | 2017 Edition

Image
12 BEST OPERATING SYSTEM FOR HACKERS It’s time to pause the archaic  Windows vs. OS X vs. Linux  discussion and switch over to some advanced operating systems dedicated to pen testing and ethical hacking. A security-focused operating system is a hacker’s best friend as it helps them to detect the weaknesses in computer systems or computer networks. In this article, we have listed 2017’s top 12 operating systems for ethical hacking. Here is the list of 12 best Linux distributions for hacking along with their download links. All of these are based on Linux Kernel and free to use. Let’s take a look: 1: KALI  LINUX      Developed by Offensive Security as the rewrite of BackTrack, Kali Linux distro tops our list of the best operating systems for hacking purposes. This Debian-based OS comes with 600+ preinstalled pen testing tools that make your security toolbox richer. These versatile tools are updated regularly and are available for different platfor...

Hack Any Android Device With FatRat Tool. || Kali Linux || Parrot Security OS

Image
Hello, Guys Today I will Show You How To Hack Any Android Device With FatRat Tool.  * Warning *  1. It's for Education Purpose Only. 2. All Attacks Done With My Own device 3. Don't Use In Illegal Works. *Requirements* 1. Kali Linux Installed Pc  (You Can Run Also Live Mode) 2. Some Knowledge About Kali Linux (Not Higher Requirement Follow My Steps      Only)  3. Android-based Any Device. 4. Some Patience. * Process* 1. Open Your Terminal And Type  git clone                                                                   https://github.com/Screetsec/TheFatRat.git 2. Wait For 15 Minutes (It's Based On Your Internet Connection). 3. Now Type cd FatRat Hit Enter, Then Type  chmod +x install.sh  And hit    ...

PARROT SECURITY TOOLS

Image
Parrot Security Could Be Your Next Security Tool Pixabay Network and security administrators rely heavily on their tools. Without the right tools, that brilliant mind can only do so much. But what tools are the best for the job of forensics or testing? As you probably know, the list of such tools is extensive and often times it’s a matter of experimentation, review, and guesswork. That’s where the likes Parrot Security come in.  Parrot Security  is a complete distribution, based on Debian Jessie core, which includes software for cryptography, cloud, anonymity, digital forensics, programming. The software list alone should be enough to have security and network admins rushing to download a copy. Anonymous mode start I2P Two Cents Crypto ZuluCrypt EtherApe Ettercap King Phisher Tor Browser TorChat Wireshark XHydra Zenmap debmod builder Parrot Cloud Controller Spectrum Tool Parrot as distribution Beyond the testing, auditing, and pr...