Security
How to perform Evil Twin WiFi Attack [Step-by-Step]
Step by Step instructions to perform evil twin wifi attack on WPA/WPA2 devices. Use airgeddon to perform evil twin wifi attack on Kali Linux
5 DNS Enumeration Tools with Best Practices & Examples
5 different tools which can be used to perform DNS enumeration from WIndows or Linux. Examples and Best practices.
How to set up WordPress Reverse Shell [100% Working]
Step by Step instructions to setup wordpress reverse shell using 3 different methods. Setup reverse shell using metasploit framework, vulnerable plugins, …
L3MON - Hack Android Mobile Remotely [Step-by-Step]
Step by step instructions to hack android remotely using l3mon RAT i.e Remote Administration Tool. Install malware on the android to access the mobile.
Install Lex and Yacc in Kali Linux [Step-by-Step]
Step by step instructions to install lex and yacc in Kali Linux with best practices
