• Aircrack-ng: Understanding and Using the Tool
    • Exploiting Browser Sessions With BeEF
    • Hooking Web Browsers with BeEF
    • Introduction to BeEF: The Browser Exploitation Framework
    • Cracking Passwords with Hashcat
    • Creating Custom Wordlists and Rules for Hydra
    • How to Use Hydra to Brute-Force SSH Connections
    • How to Use Hydra to Hack Passwords – Penetration Testing Tutorial
    • What is John The Ripper and How To Use It
    • Katana: The CLI web crawler
    • Using Katana as a Library
    • A Getting Started Guide To Linux
    • Bash Scripting in Linux
    • Text Manipulation
    • Understanding File Permissions in Linux
    • An Introduction to Metasploit
    • Conducting a Discovery Scan in Metasploit
    • Database Support in Metasploit
    • Hashing and Password cracking in Metasploit
    • How to Use a Reverse Shell in Metasploit
    • Introduction to Metasploit
    • Managing Sessions in Metasploit
    • Understanding How Payloads Work in Metasploit
    • Web Server Scanning With Nikto
    • An Introduction To Nmap
    • Nmap Cheat-Sheet: Scanning Types, Commands, and NSE Scripts
    • What is OWASP ZAP?
    • Getting started with Social Engineering Toolkit
    • Infectious Media Generator
    • Mass Mailer
    • Website Cloning and Credential Harvesting
    • An Introduction to Using sqlmap for SQL Injection Testing
    • Comprehensive Guide to SQL Injection
    • Database Fingerprinting for SQL Injection: Identifying the Underlying DBMS
    • Estimating MySQL Table Size using SQL Injection
    • Time-Based Blind SQL Injection Attacks
    • Time-Based Blind SQL Injection Using Heavy Queries
    • An Introduction To Wireshark and How To Install It
    • Capturing Data Packets Using Wireshark
    Back to Website
    • to navigate
    • to select
    • to close
      • Home
      On this page
      article

      FREE Tutorials - Security and Hacking

      code folder

      Aircrack-ng

      Aircrack-ng is a complete suite of tools to assess WiFi network security. If focus on Monitoring …

      code folder

      beEF

      BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses …

      code folder

      Hashcat

      Hashcat is a powerful password-cracking tool commonly used in cybersecurity to recover lost …

      code folder

      Hydra

      Hydra is an open-source password-cracking tool that specializes in performing fast, automated …

      code folder

      John The Ripper

      John the Ripper, often referred to as 'John' is a highly popular password-cracking tool designed for …

      code folder

      Katana

      Katana is an open-source web application security scanner that automates the process of identifying …

      code folder

      Linux Basics for Hackers

      Learn the basics of Linux for hacking and security testing.

      code folder

      Metasploit

      Metasploit is a powerful, open-source framework widely used in cybersecurity for penetration testing …

      code folder

      Nikto

      Nikto is a web server scanner designed to detect potential security issues and vulnerabilities in …

      code folder

      Nmap

      Nmap, or Network Mapper, is an open-source tool widely used for network discovery and security …

      code folder

      OWASP ZAP

      OWASP ZAP, or the Zed Attack Proxy, is a powerful open-source tool developed by the Open Web …

      code folder

      Social Engineering Toolkit

      The Social-Engineer Toolkit (SET) is a framework designed specifically to perform social engineering …

      code folder

      SQLMap

      SQLMap is an open-source penetration testing tool specifically designed to automate the process of …

      code folder

      Wireshark

      Wireshark is a widely used network protocol analyzer that captures and inspects packets transmitted …