Skip to navigation Skip to content
Live Linux USB
  • Home
  • Shop
  • My Account
  • Blog
  • About
  • Contact Us
0 $0.00
  • No products in the cart.

All Departments
  • Home
  • Shop
  • My Account
  • Blog
  • About
  • Contact Us
  • Home
  • Shop
  • My Account
  • Blog
  • About
  • Contact Us
Live Linux USB
  • Search
  • 0
HomeHacking Tutorials

How to use Macphish on Kali Linux to create a Trojan on a Mac

Hacking Tutorials April 19, 2020 September 18, 2021 Fortrogen
Macphish is a tool that automatically generates applescripts that will allow you to gain remote access to a computer. By giving macphish an IP address, a listening port, a payload, and a trojan type, we can generate an applescript that will run create a backdoor.
Read More
1

How to hack a mac using a trojan in Kali Linux

Hacking Tutorials April 19, 2020 September 17, 2021 Fortrogen
In this article, we will be using Kali Linux to create a fake pdf that installs a trojan on a mac.
Read More
1

How to crack a Wifi Password using Kali Linux

Hacking Tutorials April 19, 2020 September 17, 2021 Fortrogen
We've all dreamed about hacking into a wifi network like they do in the movies, and luckily, this dream can come true with Kali Linux.
Read More
Leave a comment

How to use Meterpreter when controlling a Trojan

Hacking Tutorials April 17, 2020 September 17, 2021 Fortrogen
This is a general explanation of how to use Metasploit in Kali Linux, allowing you to get remote access to a computer.
Read More
Leave a comment

How to Create a Trojan Virus in Kali Linux

Hacking Tutorials February 23, 2020 April 4, 2024 livelinuxusb
In this article, we will be using one of Kali Linux's vast selection of hacking tools to create a trojan that we can put on someone's computer. Depending on which tool we use, we can have access to almost everything in the victim's computer.
Read More
5

How to DOS (Denial of Service) Attack Your Own Wifi with Kali Linux

Hacking Tutorials February 1, 2020 April 4, 2024 livelinuxusb
Kali Linux is an OS used for cyber security; the OS comes with a variety of tools, known as penetration testing tools, which are very capable of testing networks and systems. Some capabilities are: sniffing for passwords on a wifi network, wifi password cracking, DNS spoofing, and creating trojan viruses.
Read More
2

Categories

  • Computer Repair
  • Hacking Tutorials
  • Hiren's Boot CD
  • Uncategorized

Recent Posts

  • How to revive your old PC and save money using Linux September 18, 2021
  • How to Perform an Evil Twin Attack With Airgeddon September 18, 2021
  • How to Reset Your Windows Password Using Hiren’s Boot CD September 6, 2020
  • How to Use the Malwarebytes Antivirus Tool to Remove Unwanted Programs September 6, 2020
  • How to recover deleted files from your PC using Hiren’s BootCD PE August 3, 2020
Sign up to our Newsletter
...and receive and receive $5 for your first order
Live Linux USB
Call US: (800) 881-9814
Contact Info
Live Linux USB
1812 W Burbank Blvd #5395
Burbank CA 91506
  • Refund policy
© Live Linux USB - All Rights Reserved

My Account

  • My Account
  • Cart
  • Checkout
  • Track your Order
  • Refund policy
Live Linux USB
Call US: (800) 881-9814