Bash Command Not Found, Common Reasons and Solutions

Most of the time in Linux OS we run commands and programs by typing the commands in the Terminal program. However, sometimes when we run the command, we receive an error “bash :command not found”. There can be many reasons for receiving this error. Sometimes, with the minimal installation of OS, we do not see …

Read moreBash Command Not Found, Common Reasons and Solutions

All Kali Linux Tools Listing and Uses

Kali Linux Tools Listing Information Gathering In this article, we have listed some of the best Ethical Hacking and Penetration Testing Tools that you can use with Kali Linux for a great purpose. ace-voip Amap APT2 arp-scan Automater bing-ip2hosts braa CaseFile CDPSnarf cisco-torch copy-router-config DMitry dnmap dnsenum dnsmap DNSRecon dnstracer dnswalk DotDotPwn enum4linux enumIAX EyeWitness Faraday Fierce Firewalk fragroute …

Read moreAll Kali Linux Tools Listing and Uses

ARP Poisoning using Ettercap in Kali Linux

Welcome to a tutorial devoted to ARP Poisoning using Ettercap software!First of all, I would like to point out that this tutorial will present the graphic aspect of Ettercap, and not its form in the console. Let’s start! First, under Kali-Linux, Launch Ettercap in Applications> Internet> Ettercap, or with the command ettercap -G Once ettercap is launched, …

Read moreARP Poisoning using Ettercap in Kali Linux

Configure Metasploit

Metasploit is an essential tool to facilitate the exploitation of vulnerabilities. Among other things, it allows: – identify vulnerabilities using Nmap or Nexpose; – easily create custom Payloads (via the “set” command); – to benefit from essential functionalities supplied turnkey with the “meterpreteur” shell; …. The Metasploit framework is obviously pre-installed on Kali Linux however it …

Read moreConfigure Metasploit

How To Install Hide My Ass In Kali Linux

Hide my ass is reputed to be one of the best VPN services of the moment, there is no bridging performed on the Peer To Peer download protocols (torrents,…) and you can have more than 100 servers distributed in more than 60 different countries! Hide My Ass makes more than 60,000 IP addresses available to its customers. To …

Read moreHow To Install Hide My Ass In Kali Linux

HOW TO INSTALL AND USE XSSPY TO SEARCH FOR XSS VULNERABILITY IN TERMUX

xss

XssPy – Web Application XSS Scanner XssPy is a python tool for finding Cross-Site Scripting vulnerabilities in websites. This tool is the first of its kind. Instead of just checking one page as most of the tools do, this tool traverses the website and find all the links and subdomains first. After that, it starts …

Read moreHOW TO INSTALL AND USE XSSPY TO SEARCH FOR XSS VULNERABILITY IN TERMUX

INCREASE INSTAGRAM FOLLOWERS WITH IN Termux

How to increase Instagram followers

Instagram hacks: Track un-followers, Increase your followers, Download Stories, etc Features: Unfollow Tracker Increase Followers Download: Stories, Saved Content, Following/followers list, Profile Info Unfollow all your following unfollow Tracker Increase Followers Download: Stories, Saved Content, Following/followers list, Profile Info Open termux and type ‘ pkg install git ‘. Now type ‘ git clone https://github.com/thelinuxchoice/inshackle.git ‘. …

Read moreINCREASE INSTAGRAM FOLLOWERS WITH IN Termux

Security Specialists – All Hacking Tools – List for Penetration Testing – Hacking

All Hacking Tools

Penetration testing and tools for hackers are more often used by security industries to test vulnerabilities in networks and applications. Here you can find a complete list of penetration testing and hacking tools that covers penetration testing operations in all environments. List of tools for hackers and penetration testing Online resources Penetration testing resources Exploit …

Read moreSecurity Specialists – All Hacking Tools – List for Penetration Testing – Hacking

METASPLOITABLE 2 : VULNERABILITY ASSESSMENT AND REMOTE LOGIN

PORTSCAN On a Kali Linux machine, open a terminal. Type ifconfig, and note the eth0 IP address. This will give you an idea of what the ip of your target machine could be. In my case, ifconfig returned my IPv4 address as 192.168.154.131. This means that Metasploitable must have an IP residing somewhere in the …

Read moreMETASPLOITABLE 2 : VULNERABILITY ASSESSMENT AND REMOTE LOGIN

What is DNS-Spoofing and how it Works

dns-spoofing

Hi this is shahid malla we are updated our old posts on our official website coz we lost all data of our website during we are in prison  DNS Spoofing: it’s a way to transfer visitor to your fake page from original website, Here let me explain you in simple word that you can understand …

Read moreWhat is DNS-Spoofing and how it Works

what is reaver in Kali Linux

Wifi Security

Reaver is a Linux based software which brute-force the WPS pins on the router which has wps / Push Button enabled and it comes preloaded with Kali Linux OS.  Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in this paper What is WPS …

Read morewhat is reaver in Kali Linux