If you have spent some time in tech as a hobby, or for your work, you have probably heard of Linux. What exactly is Linux, and why do people choose to use it? Well, to put it simply, it is an operating system just like Windows or Mac OSX. It …
Hiren's Boot CD comes with a tool that allows you to reset a Windows password.
The Malwarebytes Antivirus Tool comes installed on Hiren's Boot CD and can identify and uninstall unwanted files.
MX Linux is a Linux distribution that is lightweight, easy to use and install, and can be run on pretty much any modern computer. In this tutorial, I will be explaining how MX Linux works and how you can take an old computer and revive it using a live USB of MX Linux.
When you right-click on a file and select "delete," Windows doesn't actually delete the file. To Permanently delete a file you must "overwrite" the file using special software.
Macphish is a tool that automatically generates applescripts that will allow you to gain remote access to a computer. By giving macphish an IP address, a listening port, a payload, and a trojan type, we can generate an applescript that will run create a backdoor.
In this article, we will be using Kali Linux to create a fake pdf that installs a trojan on a mac.
We've all dreamed about hacking into a wifi network like they do in the movies, and luckily, this dream can come true with Kali Linux.
This is a general explanation of how to use Metasploit in Kali Linux, allowing you to get remote access to a computer.
In this article, we will be using one of Kali Linux's vast selection of hacking tools to create a trojan that we can put on someone's computer. Depending on which tool we use, we can have access to almost everything in the victim's computer.