
Bypass the Network Authentication with DNS Tunnelling
Data through port *53* is not intercepted, and the authentication system can be bypassed using the DNS channel.
Data through port *53* is not intercepted, and the authentication system can be bypassed using the DNS channel.
Set proxy for CMD/Powershell/Terminal/Git
mdk3 is used for **stress testing 802.11 networks(wifi)**. It consists of various methods by which we can perform tests. Some of major method sare beacon flooding, deauthentication, WPA-dos etc...
Now, more and more people wants to be anonymous. Telegram, an IM known as *"focus on security and privacy"*, is chosen. But, does Telegram really "focus on security and privacy" as it advertises? A...
We collected several best or most popular DDos Tools for DDos testings.The collection will keep updating, adding new tools & tutorials.
libpng is more stringent about checking ICC profiles than previous versions. In Qt, if you use certain formats of PNG images, you may get a libpng warning - known incorrect sRGB profile, though thi...
It's necessary to execute system commands sometime. system() is the most basic, it's easy but cannot hide the black command line window, its options are not much enough. Here're some better ways.
ARP spoofing is a type of attack in which a malicious actor sends falsified ARP messages over a local area network. We use Kali/Parrot Linux to make a simple ARP Spoofing.
Conky has changed its syntax, and new configure file should be written.
Conky is a free, light-weight system monitor for X, that displays any kind of information on your desktop. We'll now talk about something on conky, also the troubleshoot with the use of conky.