In this article, we will go through different tools and techniques that should be known to retrieve information about your target. + SMTP technique : In this part I will provide some different techniques of SMTP Enumeration, first I want to give some details about the important commands that we […]

almalinux vs rockylinux

Both AlmaLinux and Rocky Linux are free open-source Linux distributions that are compatible with RHEL, and they have gained popularity for several years since the discontinuation of CentOS in December 2020. This article aims to explore AlmaLinux and Rocky Linux, comparing their features, development philosophies, and future trajectories. It offers […]

Reaver

What is Reaver? “Reaver” in the context of Linux refers to a specific tool known as “Reaver-WPS.” Reaver is a popular open-source command-line tool used for performing brute-force attacks on WPS-enabled (Wi-Fi Protected Setup) routers. Its primary purpose is to crack the WPA/WPA2 pre-shared key of a Wi-Fi network by exploiting the […]

The PHP team is yet to officially release PHP 8.1 on November 25, 2021. Usually there is a 6 months pre-release phase before the GA release of PHP. As most of you know, PHP is a widely used scripting language. It is mostly used to create web applications and dynamic web […]

ModSecurity (also known as ModSec) is an open-source web application firewall (WAF). It is implemented to protect sites and applications against many common attacks, including XSS, code injection, etc. 70% of all attacks are carried out through the application level of the web. Thus, implementing a WAF would be helpful […]

Bash Script Examples Let’s have a look into some of the amazing bash scrip examples that  can be handy for you. Bash scripts are normally used for executing a shell command or running multiple commands together and also for the automation of the work. Let’s have a look into the […]

Introduction: In Linux systems, the kernel serves as the core component responsible for managing system resources and providing essential functionality. CentOS and Red Hat Enterprise Linux (RHEL) are widely used distributions that offer various kernels to choose from. However, it’s often necessary to set a default boot kernel to ensure […]

Introduction You think your passwords are strong and secure? You are mistaken! There are numerous options to secure your password, but when it comes to the Password Cracker THC Hydra, you are done. However, you can use some of the cryptography techniques to secure your password or at least make it […]

Do you want a computer to finish your Linux programme for you? If so, try out ShellGPT, which can finish your Ubuntu Terminal tasks with the help of ChatGPT. You don’t have to remember complicated Linux orders; just tell the Chatbot to run them. Therefore, we will see in this […]