Monthly Archive: May 2016

top-10-tools-kali-linux 1

Top 10 tools in Kali Linux

Kali linux is the most advanced penetration testing OS ever build. Kali linux has plenty of tools available for various attacks. These are my favorite top 10 security tools. There are plenty of tools available,...

5-tips-to-stay-anonymous-online 6

5 Tips to stay anonymous online

Online anonymity is vital for a hacker or a person who want privacy. If you are concerned about your privacy and security you must read this. Staying anonymous online means hiding your IP address, location...

sql-injection-tutorial 5

How to hack a database with sql injection – sqlmap

We all know websites need a database to store data. That is called s RDBMS – relational database management system. These databases store data in tables and columns so that it can be accessed easily. Server side...

earn-bitcoin-without-mining 3

How to earn bitcoins without mining 2016

Bitcoin is a crypto-currency, unlike traditional currency bitcoin is not printed on a paper or a metal coin. Its in the form of bits that  can stored on a computer. These cryptocurrencies are highly...

change-tor-exit-node-mannually 3

How to change tor exit node manually

 When it comes to penetration testing the first preference is online anonymity. Hackers use services such as VPN or TOR, comparatively tor offers more security and anonymity on the web and in addition it allow access to the dark...

create-custom-wordlist-crunch 0

How to create custom wordlist

In penetration testing the worst part is authentication failure. Cracking a hash or a dictionary attack to an authentication form is time consuming. It depends on the strength of the password. An eight character...