Kali Linux Hard Disk install

How to install Kali Linux Hard Disk  Kali Linux Installation Requirements Installing Kali Linux on your computer is an easy process. First, you’ll need compatible computer hardware. Kali is supported on i386,... Read more »

Building a Kali Linux ISO for Older i386 Architecture

  Building a Kali Linux ISO for Older i386 Architecture The Kali Linux i386 ISO has PAE enabled. If you require a default kernel for older hardware with PAE disabled, you will... Read more »

Live build a Custom Kali ISO

Live build a Custom Kali ISO Building a customized Kali ISO is easy, fun, and rewarding. You can configure virtually any aspect of your Kali ISO build using the Debian live-build scripts.... Read more »

Adding USB Persistence with LUKS Encryption

Adding USB Persistence with LUKS Encryption Alternatively, you can create a LUKS-encrypted persistent storage area. This adds an extra layer of security to your sensitive files when traveling with Kali Live on... Read more »

Maintaining Access

Powersploit This is a tool that is for Windows machines. It has PowerShell installed in victims machine. This tool helps the hacker to connect with the victim’s machine via PowerShell. To open... Read more »

Kali Linux live USB persistence

Adding Persistence to a Kali Linux “Live” USB Drive Kali Linux “Live” has two options in the default boot menu which enable persistence — the preservation of data on the “Kali Live”... Read more »

Password cracking Tool

Hydra Hydra is a login cracker that supports many protocols to attack ( Cisco AAA, Cisco auth, Cisco enable, CVS, FTP, HTTP(S)-FORM-GET, HTTP(S)-FORM-POST, HTTP(S)-GET, HTTP(S)-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MySQL,... Read more »

Remote Network penetration via NetBios hack/hacking

These are basic techniques but very useful when penetration testing any Windows based network, the techniques were discovered on WinNT but are still very valid on Windows2000 and in some cases Windows2003... Read more »

Sniffing & spoofing

The basic concept of sniffing tools is as simple as wiretapping and Kali Linux has some popular tools for this purpose. Burpsuite Burpsuite can be used as a sniffing tool between your... Read more »

Stressing tools

Stressing tools are used to create DoS attacks or to create the stress test for different applications so as take appropriate measures for the future. All the Stress testing tools are found... Read more »