Metasploit Powershell Shellcode Injector Hack

Metasploit Powershell Shellcode Injector Hack

The growth of Metasploit has increased over the years and has become rather popular among hackers, script kiddies, penetration testers, cyber security analysts, and information security engineers. The fact that it is open source is a reason for it’s popularity....
Setup VNC Server in Raspbian Jessie with Pixel

Setup VNC Server in Raspbian Jessie with Pixel

If you are a Raspberry Pi owner and are testing out the Raspbian Jessie operating system with the new PIXEL desktop environment then you’ll most likely want to setup VNC server in Raspbian Jessie with PIXEL. Raspbian Jessie is based on Debian Linux and comes...
How to Make a WiFi Jammer with Raspberry Pi 3

How to Make a WiFi Jammer with Raspberry Pi 3

The Raspberry Pi has become quite the phenomenon in the computing world for hobbyists, inventors, and students. Raspberry Pi projects have been sprouting up all over and it has opened up new doors in the tech world. In our project we are going to demonstrate how to...
How to Disable Onboard WiFi for Raspberry Pi 3

How to Disable Onboard WiFi for Raspberry Pi 3

Figuring out how to disable onboard WiFi for Raspberry Pi 3 is great if you have a USB WiFi adapter that you plan on using instead. If you plan on capturing and analyzing packets then you will need a WiFi adapter that supports monitor mode. The onboard WiFi for the...
How to Hack a WordPress Site with WPScan in Kali Linux

How to Hack a WordPress Site with WPScan in Kali Linux

Testing websites for vulnerabilities can help identify bugs that can ultimately lead to actions that you can take to secure it. Preventing hackers from accessing your website is a top priority. You should always test your website for vulnerabilities to prevent someone...