How to use metasploit to scan for vulnerabilities
Continuing on from my original metasploit beginners tutorial, here is a slightly more advanced Metasploit tutorial on how to use metasploit to scan for vulnerabilities. The outcome of this tutorial…
Continuing on from my original metasploit beginners tutorial, here is a slightly more advanced Metasploit tutorial on how to use metasploit to scan for vulnerabilities. The outcome of this tutorial…
It turns out that coding in php on android is possible (even if its not as good as on a mac, linux or even windows). In this blog post I'll…
This is a short post on how to setup a dvwa vagrant box for your testing. I recommend this method when installing and testing new tools (and even for developing…
Vagrant with NFS and public_network. You can use NFS in vagrant, but it requires a private_network to work; This is fine if you are doing all your devlopment from a…
This is a short post on how to remove unused kernels in linux. I'm adding it here because I use it regularly and keep forgetting the commands - it might…
I wrote a previous post about kali on the hi10, and promised a followup on Chuwi hi10 pro kali linux wifi fixes; here it is. The on-board wifi works out…
Chuwi Hi10 Pro ultrabook tablet convertable surface - That's some title, but I'm not sure how to describe my new machine. Its a tablet, but its also a laptop -…
This post has a collection of Linux commands for networking. There are basic linux network commands, advanced linux network commands and some centos network configuration commands, but I've tried to…
Pihole on a raspberry pi - making a network wide advert blocker with a raspberry pi. I have a router using dnsmasq with adblocking setup on my router. I also…