Category

Cybersecurity and Ethical Hacking Tutorials

Learn cybersecurity concepts, ethical hacking techniques, system hardening, and best practices to secure applications and infrastructure.

The Security section covers cybersecurity concepts, ethical hacking techniques, and system hardening practices.

Security is critical for protecting systems, networks, and applications from threats. These tutorials will help you understand vulnerabilities and implement best practices.

You can also explore Linux and Networking for deeper insights.

Topics covered

  • Ethical hacking basics
  • System hardening techniques
  • Authentication and access control
  • Security best practices

Ideal for

  • Security enthusiasts
  • System administrators
  • DevOps engineers

149 articles

How to build Windows Remote Access Trojan? [SOLVED]

After the installation is complete, we can now proceed to install, run and use RAT-el to build a Windows RAT payload. We download the tool’s file from its

By kennedymuthii · 6 min read · security

MobSF: Android App Pentesting [Step-by-Step]

Mobile app pentesting is a crucial process that ensures the safety of data and sensitive information stored in mobile applications. With the rising number of

By kennedymuthii · 5 min read · security

APKHunt: Android App Pentesting [Step-by-Step]

APKHunt is a powerful tool used in the android app pentest. Android app pentest, short for Android application penetration testing, is the process of

By kennedymuthii · 5 min read · security

How to use Andriller - Forensic Tool [SOLVED]

Andriller is a popular and comprehensive android forensic tool that provides a powerful suite of features for forensic experts and law enforcement agencies to

By kennedymuthii · 5 min read · security

How to use SpiderFoot? [SOLVED]

Spiderfoot is a versatile and powerful open-source reconnaissance tool that can gather intelligence about a target. This tool is designed to automate various

By kennedymuthii · 5 min read · security

How to Bypass Android Lock Screen? [100% Working]

Android PIN bypass refers to the process of bypassing the PIN code that is used to lock and secure an Android device. This can be done through various

By kennedymuthii · 5 min read · security

How to manage Pentest Projects with Cervantes?

Cervantes is an open source, a collaborative platform designed for pen-testers and red teams looking to save time and manage their projects, clients,

By kennedymuthii · 5 min read · security

Automate SSH Brute Force Attack [4 Methods]

SSH brute force attacks are a type of cyber attack that is becoming increasingly common. They involve the use of automated software to try and gain access to

By kennedymuthii · 5 min read · security

Browser-in-the-Browser Attack [Step-by-Step]

A browser-in-the-browser attack is an exploit that involves an attacker using a malicious browser to gain access to a target system. This type of attack is

By kennedymuthii · 4 min read · security

Perform a Local File Inclusion Attack [100% Working]

Local file inclusion (LFI) is a type of cyber attack in which an attacker is able to gain access to sensitive information stored on a server by exploiting the

By kennedymuthii · 6 min read · security

Perform VNC Brute Force Attack [100% Working]

In this guide, I will illustrate ways a bad actor may perform a VNC brute force attack to gain access and control a target computer.

By kennedymuthii · 5 min read · security